
The quantum sea change: Navigating the impacts for cryptography
Professionals in cybersecurity and cryptography (and even non-IT executives) are hearing about the coming threat from quantum computing. It’s reaching the mainstream business …

Do people with malicious intent present the biggest threat to personal data?
Against the backdrop of a complex and growing cyber threat landscape, organizations are waking up to the fact that one of the biggest chinks in their armour against a data …

Is AI really intelligent or are its procedures just averagely successful?
Artificial intelligence (AI) and machine learning algorithms such as Deep Learning have become integral parts of our daily lives: they enable digital speech assistants or …

90% of consumers value additional security measures to verify mobile-based transactions
A strong majority of US adults value additional security measures for mobile transactions, with 90% reporting they would want the ability to approve some or all mobile device …

Data breach reports delayed as organizations struggle to achieve GDPR compliance
Businesses routinely delayed data breach disclosure and failed to provide important details to the ICO in the year prior to the GDPR’s enactment. On average, businesses waited …

Two thirds of Android antimalware apps are ineffective or unreliable
Choosing an effective Android antimalware app is a shot in the dark for many users and they may end up in more danger of malicious apps, not less. In fact, as the results of …

Public-interest technology: Why companies should get involved
“For the last 15 or 20 years, anything Silicon Valley companies did was seemingly in the public interest, and society has encouraged that view until quite …

Moving from traditional on-premise solutions to cloud-based security
In this Help Net Security podcast recorded at RSA Conference 2019, Gary Marsden, Senior Director, Data Protection Services at Gemalto, talks about the feedback they’re …

Protecting applications against DFA attacks
2001 was an exciting time for cryptography, as the new Advanced Encryption Standard (AES) specification was finalized, making a mathematically secure and performant encryption …

Businesses recognize the need for AI & ML tools in cybersecurity
71 percent of businesses surveyed in the United States plan to use more artificial intelligence and machine learning (AI/ML) in their cybersecurity tools this year, although …

Companies unprepared for PSD2, stricter EU requirements will drive fraud to other regions
A new iovation report includes original research and analyzes the consequences for the global online payments market around the revised Payment Services Directive (PSD2). By …

Urgent need for IT security legal framework in Europe
Information transmission, transport, industrial production, research, administration – hardly any area can manage without modern information and communication …
Featured news
Resources
Don't miss
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
- RansomHub affiliate leverages multi-function Betruger backdoor
- Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
- 5 pitfalls that can delay cyber incident response and recovery
- How healthcare CISOs can balance security and accessibility without compromising care