Help Net Security
The impact of new EU security legislation
Based on a survey of organizations from the UK, France and Germany, FireEye found that many organizations in Europe are unprepared for and challenged by cost and complexity of …
Employees would sell passwords for $150
SailPoint uncovered a widespread level of employee indifference towards protecting sensitive corporate data, including personal information of customers. In fact, an alarming …
Video: Bruce Schneier talks to Edward Snowden
As part of a Harvard computer science symposium, Bruce Schneier had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography to …
How the Internet of Things impacts enterprise security
A new study conducted by Atomik Research examined the impact that emerging security threats connected with the Internet of Things (IoT) have on enterprise security. Study …
Open source software for quantum information
NIST has partnered with the private sector to develop the next-generation open source control software for quantum information systems. NIST is a world leader in quantum …
APTs: Minimizing losses with early detection
Let’s travel back to 2006, the year the blockbuster, “The Departed,” came out. Matt Damon plays a young criminal who has infiltrated the state police as an …
Week in review: HealthCare.gov leaks user data, Angler kit exploits Flash 0-day, researchers recreate NSA’s spying tools on the cheap
Here’s an overview of some of last week’s most interesting news, interviews and articles: Has the time come to give up penetration testing? The more miles of …
Why leaving a shared device unprotected is dangerous
According to a survey jointly executed by B2B International and Kaspersky Lab, 32 per cent of respondents who share an Internet-enabled device with their relatives, colleagues …
DMARC: The time is right for email authentication
It is a rare thing to be given the opportunity to right a historic wrong. The root of essentially every Internet security issue in history is the same—architects try to build …
5 tips for dealing with cyberbullying in education
According to the latest figures by nobullying.com, 68 per cent of teens agree that cyber bullying has now become a serious problem in schools. This is exacerbated by the fact …
79% of professionals do business on personal devices
As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their …
Why insider threat is thriving
In the past few years, rapid growth in the volume of sensitive information combined with new technologies has chipped away at the effectiveness of traditional endpoint …
Featured news
Resources
Don't miss
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)
- Acrobat Reader zero-day exploited in the wild for many months
- AI agent intent is a starting point, not a security strategy
- Asqav: Open-source SDK for AI agent governance
- BlueHammer: Windows zero-day exploit leaked