Help Net Security

Evaluating artificial intelligence and machine learning-based systems for cyber security
All indicators suggest that 2017 is shaping up to be the year of artificial intelligence and machine learning technology for cyber security. As with most trends in our …

DLP APIs: The next frontier for Data Loss Prevention
According to the Breach Level Index, there have been 7,094,922,061 data records lost or stolen since 2013 with 4,417,760 records lost or stolen every day, 184,073 records …

Equipment already in space can be adapted for extremely secure data encryption
In a new study, researchers from the Max Planck Institute in Erlangen, demonstrate ground-based measurements of quantum states sent by a laser aboard a satellite 38,000 …

Cloud-based security services market to reach nearly $9 billion by 2020
Growth in worldwide cloud-based security services will remain strong, reaching $5.9 billion in 2017, up 21 percent from 2016, according to Gartner. Overall growth in the …

Week in review: Mac malware-as-a-Service, CIA hacking routers, top tech for infosec
Here’s an overview of some of last week’s most interesting news and articles: End-to-end email encryption with no central point of attack A seamless, easy-to-use, …

Keys, tokens and too much trust found in container images
We are all aware of the risks introduced by good old third party code. Where would we be without it? Apparently not very far. It is estimated that between 30 to 70 percent of …

Perception and reality: The role of AI and automated cyber defenses
Executives in the U.S. and Europe now place broad trust in artificial intelligence (AI) and machine learning systems, designed to protect organizations from more dynamic …

Most corporate finance leaders expect to change fraud-fighting strategies
Today’s senior finance executives are battling record levels of fraud, in turn narrowing corporate focus and limiting resources that could otherwise be devoted to …

Whitepaper: Confronting advanced threats as an organization
This whitepaper is no longer available. Global cybersecurity issues have gone mainstream, but email security has curiously slipped by the wayside despite the fact that 91% of …

DevSecOps: Build a bridge between fast and secure software development
Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …

Is Europe ready for GDPR?
What impact will GDPR have on businesses across the UK, France, Belgium and Luxemburg? Vanson Bourne surveyed 625 IT decision makers in four countries and found that the UK is …

International operation targets customers of counter anti-virus and crypter services
Between 5 and 9 June, 6 suspects were arrested and 36 were interviewed during an internationally coordinated operation in 6 European countries. The targets are all suspected …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)