Help Net Security

IoT security: Lessons we can learn from the evolution of road safety
I was recently chatting with my father about his life as a young boy growing up in rural Ireland in the middle of the last century, and the conversation moved onto cars and …

Nearly 15% of US security budgets go to remediating active compromises
Malwarebytes and Osterman Research have polled 900 senior IT decision-makers and IT security professionals in Australia, Germany, the US, UK, and Singapore about the impact of …

Where should companies focus as they begin their machine learning journey?
As machine learning has become more widely adopted across industries, O’Reilly set out to learn more about how companies approach this work. By surveying more than 11,000 data …

Only 8% of orgs have effective DevSecOps practices
92 percent of organizations struggle to implement security into the entire DevOps process despite most saying they want to do so – a staggering capability gap exposed in …

The security issues 3D printing should solve before going mainstream
It’s always fun when you can mix your personal hobbies and interests with your profession, and often the passion you carry for the things you love can lead to valuable and …

Most IT decision makers believe AI is the silver bullet to cybersecurity challenges
New research from ESET reveals that three in four IT decision makers (75%) believe that AI and ML are the silver bullet to solving their cybersecurity challenges. In the past …

Theft of user accounts on cryptocurrency exchanges is soaring
Within a year, the number of data leaks from cryptocurrency exchanges soared by 369%, Group-IB researchers have found, and the US, Russia and China are the countries where …

Cyber hygiene training is infrequent and inconsistent
Finn Partners Research released findings from its Cybersecurity at Work study that examined the level of cyber risk that employees pose to their organizations. The in-depth …
Qualys integrates real-time network analysis in its Cloud Platform
Qualys has introduced Passive Network Sensor (PNS), a new member of the Qualys sensor family that natively integrates network analysis functions into the Qualys Cloud …

Researchers open source tools to identify Twitter bots at scale
Duo Security published technical research and methodology detailing how to identify automated Twitter accounts, known as bots, at a mass scale. Using machine learning …

Qualys at Black Hat USA 2018: Hear best practices from industry leaders
There will be no lack of interesting content from Qualys at Black Hat USA 2018 this year. Depending on you interests, you might want to make time for some of these talks and …

Week in review: Deploying automation securely, dark web activities that indicate a breach
Here’s an overview of some of last week’s most interesting news and articles: Industrial cybersecurity: Protecting OT from IT A powerful technique for protecting …
Featured news
Resources
Don't miss
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth