Help Net Security

eBook: 5 emerging rail cybersecurity standards
This eBook is no longer available. With massive capital investments in rail infrastructure and technology, many countries understand that it’s time cybersecurity standards …

The role of trust in security: Building relationships with management and employees
Massive data breaches have become the new reality, and they confirm that one of the biggest challenges companies face when it comes to security: a company’s biggest …

CISOs are feeling less confident than ever about cyber risk and data security
Chief Information Security Officers are feeling less confident than ever about cyber-risk and data security this year, according to a survey conducted by Ponemon Institute in …

On-card biometric for contactless payments tested in first commercial pilots
Visa has initiated pilots with Mountain America Credit Union and Bank of Cyprus of a new EMV dual-interface (chip- and contactless-enabled) payment card, making these the …

Week in review: WPA3, Intel AMT vulnerability, Meltdown and Spectre attack detection
Here’s an overview of some of last week’s most interesting news and articles: CBP releases new guidelines on phone, laptop searches at US borders The US Customs …

Intel AMT security issue gives attackers complete control over a laptop
F-Secure reports a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds. The issue allows …

One in five healthcare pros have experienced patient data breaches
According to a recent University of Phoenix College of Health Professions online survey of 504 registered nurses and administrative staff, only a quarter of registered nurses …

Strong security simplifies compliance for French operators of vital industry
In 2014, France’s National Agency for the Security of Information Systems, or ANSSI, issued two detailed cybersecurity guidance documents for Industrial Control Systems: …

Researchers uncover major security vulnerabilities in ICS mobile applications
IOActive and Embedi researchers found 147 cybersecurity vulnerabilities in 34 mobile applications used in tandem with SCADA systems. Proof-of-concept Attack on Victim HMI …

Security, management and compliance challenges are impacting cloud benefits
Management and compliance challenges are impacting the benefits businesses are receiving from using the cloud as their infrastructures become more complex, according to …

Security concerns remain a top challenge for digital transformation
In Frost & Sullivan’s recent survey seeking end-user perspectives on navigating digital transformation globally, 32 percent of IT professionals cited security …

eBook: Detect and deter data theft by departing employees
This promotion has ended. Too many organizations choose not to take the threat of data theft by departing employees seriously — until they discover that their data has been …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!