Help Net Security

One in five healthcare pros have experienced patient data breaches
According to a recent University of Phoenix College of Health Professions online survey of 504 registered nurses and administrative staff, only a quarter of registered nurses …

Strong security simplifies compliance for French operators of vital industry
In 2014, France’s National Agency for the Security of Information Systems, or ANSSI, issued two detailed cybersecurity guidance documents for Industrial Control Systems: …

Researchers uncover major security vulnerabilities in ICS mobile applications
IOActive and Embedi researchers found 147 cybersecurity vulnerabilities in 34 mobile applications used in tandem with SCADA systems. Proof-of-concept Attack on Victim HMI …

Security, management and compliance challenges are impacting cloud benefits
Management and compliance challenges are impacting the benefits businesses are receiving from using the cloud as their infrastructures become more complex, according to …

Security concerns remain a top challenge for digital transformation
In Frost & Sullivan’s recent survey seeking end-user perspectives on navigating digital transformation globally, 32 percent of IT professionals cited security …

eBook: Detect and deter data theft by departing employees
This promotion has ended. Too many organizations choose not to take the threat of data theft by departing employees seriously — until they discover that their data has been …

What the rise of cyber indictments means for 2018
The growing implementation of indictments throughout 2017 was arguably the most impactful government action to counter cyber attacks, and yet received little attention. In …

More than half of US-based employees have never heard of GDPR
With the General Data Protection Regulation (GDPR) deadline approaching, new research from MediaPro shows more than half of US-based employees have never heard of the …

Apps most frequently blacklisted by enterprise security teams
Appthority released its Enterprise Mobile Security Pulse Report for Q4 2017, which details the apps most frequently blacklisted by enterprise mobility and security teams. Most …

Continuous security: What’s in a name?
DevOps has changed the lives of programmers everywhere for the better. Giving engineering teams operational responsibility drives more robust offerings and better automation. …

Cyxtera acquires Immunity Inc.
Cyxtera Technologies has entered into a definitive agreement to acquire privately-held Immunity Inc, a provider in offense-oriented systems vulnerability research, exploit …

Reacting to a big breach
As I write this, the industry is still wagging its fingers at the latest big breach. But in the time that it takes to get this published, there could easily be another …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)