Help Net Security

The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors
There is a dramatic increase in IoT-related data breaches specifically due to an unsecured IoT device or application since 2017 – from 15 percent to 26 percent – and the …

Whose (usage) data is it, anyway?
Around the world, business customers now demand business-to-business (B2B) SaaS companies safeguard their usage data. More importantly, they want to know how SaaS companies …

How institutions, advisors, and investors think about digital assets
Institutional investors are finding appeal in digital assets and many are looking to invest more in digital assets over the next five years, according to new research from …

Cynet Free IR tool offering empowers responders to know and act against active attacks
The saying that there are two types of organizations, those that have gotten breached and those who have but just don’t know it yet, has never been more relevant, making sound …

Is curiosity killing patient privacy?
The digitization of healthcare is changing the face of fraud. With the growth of electronic health records (EHRs), online patient portals and virtual clinics, a wealth of …

Open banking establishes new access to banks’ networks, creating additional security issues
As more markets adopt open banking — which mandates banks to open their systems to third parties — it will be increasingly critical for banks to ensure the security of not …

Senior payment executives’ thoughts on SME PCI compliance and security
Acquirers now hold higher expectations for compliance than they did 12 months ago, Sysnet Global Solutions has established. What is your current compliance rate? The annual …

Bad actors increasingly spreading misinformation via social media ahead of EU elections
Bad actors are amplifying misinformation content directed at EU member states to shape public perception, a report by SafeGuard Cyber reveals. The report provides evidence and …

Unhackable? New chip makes the computer an unsolvable puzzle
A new computer processor architecture that could usher in a future where computers proactively defend against threats, rendering the current electronic security model of bugs …

C-Suite execs and policy makers find cybersecurity technology investments essential
The majority of C-Suite executives and policy makers in the United States believe investing in security software, infrastructure and emerging technologies is critical to …

Flaws in the design of IoT devices prevent them from notifying homeowners about problems
Design flaws in smart home Internet of Things (IoT) devices that allow third parties to prevent devices from sharing information have been identified by researchers at North …

Cryptographic breakthrough allows using handshake-style encryption for time-delayed communications
When spies meet, they use secret handshakes to confirm their identities, ensuring they are who they say they are. Now, researchers at Stevens Institute of Technology, and …
Featured news
Resources
Don't miss
- Product showcase: Secure digital and physical access with the Swissbit iShield Key 2
- Trojanized KeePass opens doors for ransomware attackers
- Closing security gaps in multi-cloud and SaaS environments
- Containers are just processes: The illusion of namespace security
- Why legal must lead on AI governance before it’s too late