Please turn on your JavaScript for this page to function normally.
face
Do people with malicious intent present the biggest threat to personal data?

Against the backdrop of a complex and growing cyber threat landscape, organizations are waking up to the fact that one of the biggest chinks in their armour against a data …

bot
Is AI really intelligent or are its procedures just averagely successful?

Artificial intelligence (AI) and machine learning algorithms such as Deep Learning have become integral parts of our daily lives: they enable digital speech assistants or …

mobile payment
90% of consumers value additional security measures to verify mobile-based transactions

A strong majority of US adults value additional security measures for mobile transactions, with 90% reporting they would want the ability to approve some or all mobile device …

GDPR
Data breach reports delayed as organizations struggle to achieve GDPR compliance

Businesses routinely delayed data breach disclosure and failed to provide important details to the ICO in the year prior to the GDPR’s enactment. On average, businesses waited …

cloud
Moving from traditional on-premise solutions to cloud-based security

In this Help Net Security podcast recorded at RSA Conference 2019, Gary Marsden, Senior Director, Data Protection Services at Gemalto, talks about the feedback they’re …

hands
Protecting applications against DFA attacks

2001 was an exciting time for cryptography, as the new Advanced Encryption Standard (AES) specification was finalized, making a mathematically secure and performant encryption …

containers
Businesses recognize the need for AI & ML tools in cybersecurity

71 percent of businesses surveyed in the United States plan to use more artificial intelligence and machine learning (AI/ML) in their cybersecurity tools this year, although …

building
Companies unprepared for PSD2, stricter EU requirements will drive fraud to other regions

A new iovation report includes original research and analyzes the consequences for the global online payments market around the revised Payment Services Directive (PSD2). By …

European flag
Urgent need for IT security legal framework in Europe

Information transmission, transport, industrial production, research, administration – hardly any area can manage without modern information and communication …

Google Play
Researchers expose massive mobile adware and data stealing campaigns with 250 million downloads

Check Point Research has uncovered two massive mobile adware and data stealing campaigns, which have already had over 250 million downloads combined globally. Both target …

binary
The threat of quantum computers and the solutions that can protect us today

In this Help Net Security podcast recorded at RSA Conference 2019, Avesta Hojjati, Head of R&D at DigiCert, talks about the threat of quantum computers and the solutions …

5G
Network performance requirements grow in the era of 5G: Are your security processes ready?

The new generation of 5G cellular networks are beginning to be rolled out in leading countries like the U.S., bringing to life the promise of connecting everything from …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools