Help Net Security

RSA Conference 2019 USA: What you can expect at this year’s event
It’s that time of year: RSA Conference 2019 USA is a little over a month away. To prepare, we asked Britta Glade, Director of Content and Curation for RSA Conference, to tell …

Week in review: FaceTime bug, Apple developer certs abused, new privacy attack against 5G
Here’s an overview of some of last week’s most interesting news and articles: New Mac malware steals cookies, cryptocurrency and computing power A new piece of Mac …

DigiCert Labs to innovate new security technologies that address emerging threats
DigiCert, the world’s leading provider of TLS/SSL, IoT and PKI solutions, announced the launch of DigiCert Labs, an initiative dedicated to researching and developing …

Safeguarding your data from human error and phishing attacks with the cloud
This is the third article of a series, the first article is available here, and the second one is here. In a world of ransomware attacks, companies should prepare for the …

Is your organization ready for the data explosion?
“Data is the new oil” and its quantity is growing at an exponential rate, with IDC forecasting a 50-fold increase from 2010 to 2020. In fact, by 2020, it’s estimated that new …

Employees report 23,000 phishing incidents annually, costing $4.3 million to investigate
Account takeover-based (ATO) attacks now comprise 20 percent of advanced email attacks, according to Agari’s Q1 2019 Email Fraud & Identity Deception Trends report. …

Companies getting serious about AI and analytics, 58% are evaluating data science platforms
New O’Reilly research found that 58 percent of today’s companies are either building or evaluating data science platforms – which are essential for companies that are …

DigiCert announces CertCentral Enterprise, an all-in-one digital certificate management solution
DigiCert, the world’s leading provider of TLS/SSL, IoT and PKI solutions, announced DigiCert CertCentral Enterprise, a leading certificate management platform for cloud and …

Taking ethical action in identity: 5 steps for better biometrics
Glance at your phone. Tap a screen. Secure access granted! This is the power of biometric identity at work. The convenience of unlocking your phone with a fingertip or your …

eCommerce credit card fraud is nearly an inevitability
Riskified surveyed 5,000 US-based consumers aged 18 and older about their online shopping behaviors, experience with and prevalence of credit card fraud, repeat shopping …

Free training course material on network forensics for cybersecurity specialists
Based on current best practices, the training includes performance indicators and means that will help those who take it increase their operational skills of tackling cyber …

Enterprises are struggling with cloud complexity and security
The rush to digital transformation is putting sensitive data at risk for organizations worldwide according to the 2019 Thales Data Threat Report – Global Edition with research …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems