Help Net Security
                                How High-Tech Bridge uses machine learning
In this podcast, Ilia Kolochenko, CEO at High-Tech Bridge, talks about the difference between artificial intelligence and machine learning, and illustrates how his company …
                                TLS security: Past, present and future
The Transport Layer Security (TLS) protocol as it stands today has evolved from the Secure Sockets Layer (SSL) protocol from Netscape Communications and the Private …
                                Cloud IT infrastructure revenues grew 14.9% to $8 billion in 1Q17
Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew 14.9% year over year in the …
                                Week in review: NotPetya, Facebook to inspect private messages, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: With ransomware, pay up if you want to keep paying So there you are, staring at a …
                                Do we live in a riskier world? C-suite and senior level experts weigh in
72 percent of global business leaders say they’re operating in a riskier world, spurred by increasingly regulated industries, advanced technology and rapid digitalization, …
                                The path to protecting health data: 10 steps to get started
The information in your medical records can be more valuable than your credit card numbers to a cybercriminal. Experts estimate healthcare data is 50 times more valuable to …
                                The next frontier of cyber governance: Achieving resilience in the wake of NotPetya
Earlier this week, several European nations experienced a widespread ransomware attack. Major international giants, such as Merck, WPP, Rosneft, and AP Moller-Maersk, …
                                Top cloud challenges: Security, compliance, and cost control
A new Fugue survey, fielded to over 300 IT operations professionals, executives, and developers, found that most respondents believe that the cloud is not living up to …
                                Open Security Controller: Security service orchestration for multi-cloud environments
The Linux Foundation launched the Open Security Controller project, an open source project focused on centralizing security services orchestration for multi-cloud …
Illegal Bitcoin exchange operator gets 66-month prison sentence
Anthony Murgio, the operator of the Coin.mx Bitcoin exchange, has been sentenced to 66 months in prison for processing over $10 million in illegal Bitcoin transactions. He has …
                                What makes a good security analyst: The character traits you need
Of all the skillsets IT decision-makers are looking to hire for, cybersecurity is easily the most challenging. According to Global Knowledge’s 10th annual IT Skills and Salary …
                                Organizations award hackers up to $900,000 a year in bug bounties
A new HackerOne report examines over 800 hacker-powered programs from organizations including Airbnb, GitHub, General Motors, Intel, Lufthansa, Nintendo, U.S. Department of …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down