Help Net Security

Enterprise security incident response trends to watch in 2018
Resolve Systems shared the top trends to watch in 2018 relating to incident response and automation. The list of predictions are founded on the company’s insight into the …

AWS allows customers to manage and protect IoT devices
Amazon Web Services (AWS) announced six significant services and capabilities for connected devices at the edge. AWS IoT 1-Click, AWS IoT Device Management, AWS IoT Device …

75% of insider breaches are accidental
Approximately 25% of insider threats are hostile with the remaining 75% due to accidental or negligent activity, according to NTT Security. This graph represents the top …

Deloitte launches Threat Hunting-As-A-Service powered by Sqrrl
Deloitte CyberSOC EMEA Center, SL. closed a strategic agreement with Sqrrl to provide Managed Threat Hunting Services to clients in the EMEA region using Sqrrl’s threat …

Cut the FUD: Why Fear, Uncertainty and Doubt is harming the security industry
Although the acronym is close to a century old, FUD (Fear, Uncertainty and Doubt) has come to be closely associated with the technology industry since the 1970s. FUD is a …

Are your connected devices searchable on the Internet?
Despite being a hub for technology talent, Berliners are leaving themselves wide open to cyberattack through poor security practices that are exposing millions of cyber …

Surge in exposed credentials puts companies at risk
The volume of credential exposures has increased to 16,583 from April to July 2017, compared to 5,275 last year’s analysis by Anomali. 77% of the FTSE 100 were exposed, with …

Today only: Save $1,100 on a full RSA Conference conference pass!
UPDATE: The Cyber Monday special offer is over, but you can still get the $1,000 Early Bird discount. Register today! Save an additional $100 on top of the $1,000 Early Bird …

Data breaches hurt loyalty
A majority (70%) of consumers would stop doing business with a company if it experienced a data breach, according to a survey of more than 10,000 consumers worldwide conducted …

A look at the top seven ransomware attacks in the past decade
In part one of this series, we discussed exactly what ransomware is, including the effects of and motives behind different types of attacks. In this second article, I’ll look …

10 tips to optimize security during the holidays
Optiv Security shared its annual list of tips to help organizations get the most from their security programs during the busy holiday season. A team of security experts …

McAfee acquires Skyhigh Networks
McAfee and Skyhigh Networks announced a definitive agreement to combine businesses, with McAfee acquiring Skyhigh Networks for an undisclosed amount. Skyhigh Networks and …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface