Help Net Security

Companies investing in advanced forensic capabilities to identify attackers in greater detail
One in five companies are already using forensic investigations and other sophisticated methods to identify their attackers, like setting up honey pots and repositories of …

Week in review: New Intel CPU vulnerabilities, SharePoint servers under attack
Here’s an overview of some of last week’s most interesting news and articles: High-risk vulnerability in Cisco’s secure boot process impacts millions of devices Red Balloon …

Memory analysis is the ground truth
In recent years, enterprises have adopted next-gen endpoint protection products that are doing an admirable job detecting anomalies. For example, searching for patterns such …

The largest breaches over the past three years have caused massive and irreparable damage
Publicly traded companies suffering the worst data breaches averaged a 7.5 percent decrease in stock price, a Bitglass report reveals. Bitglass researched the three largest …

Half of companies missed GDPR deadline, 70% admit systems won’t scale
Even if given two years notice to achieve GDPR compliance, only half of companies self-reported as compliant by May 25, 2018, a DataGrail survey reveals. “The Age of Privacy: …

Analysis of device data shines a light on cybersecurity risks in healthcare
The convergence of IT, IoT and OT makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks. IoT and OT devices are …

Data will be processed by edge computing in 59% of IoT deployments by 2025
Edge computing is on the rise in IoT deployments and is expected to show solid growth over the coming years, according to Strategy Analytics most recent report. Strategy …

CISOs: What would you do over?
Just after the new year I was catching up with a CISO over lunch in Pike Place Market in Seattle. We were reminiscing about how tough it is to get a security program up and …

When all else fails, organizations realize they must share threat intel
A large majority of security IT decision makers are ready and willing to share valuable threat intelligence data to help the collective industry make better, more informed …

CEOs and business leaders trust AI, but employees are more cautious
Most senior executives (85%) classify themselves as artificial intelligence (AI) optimists, citing increased investment and trust in the technology. Eighty-seven percent say …

The six biggest cybersecurity risks facing the utilities industry
The utilities industry is rapidly modernizing its infrastructure, adding more digitized equipment and connectivity across devices, plants, and systems. This evolution to …

Security spring cleaning: 5 tips for tidying up network safeguards
Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t …