Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
connected
Biggest limiting factors to universal adoption of connected devices

After surveying 250 respondents at CES 2017, the Open Connectivity Foundation (OCF) concluded that more than 60 percent of respondents consider standardization and …

numbers
Cloud-based databases need new approaches to ensure data security

Interest and adoption of cloud-based databases is ramping up as more companies see the value of moving from traditional on-premise IT infrastructures to off-premise cloud …

healthcare
The devastating impact of healthcare data breaches

One in four U.S. consumers have had their personal medical information stolen from technology systems, according to Accenture. The findings show that half of those who …

architecture
Key obstacles to digital transformation and data privacy compliance

To stay relevant in an increasingly digital world, companies are either starting to or are currently in the process of transforming their digital environment to improve …

signature
Adobe unveils cloud-based digital signature built on an open standard

With more than seven billion mobile devices in the world and cyber-threats at an all-time high, demand has surged for simple and secure ways to sign and manage documents on …

hands
How people-based actions put critical data at risk

While 80 percent of respondents believe it’s important to understand the behaviors of people as they interact with intellectual property and other critical business …

danger
Advanced Windows botnet spreads Mirai malware

Kaspersky Lab experts are analyzing the first Windows-based spreader for the Mirai malware as part of a concerted effort to close down Mirai botnets in the wild. The Windows …

shadow
Ransomware attacks growing rapidly, organizations are struggling

The percentage of ransomware attacks increased from 5.5%, to 10.5% of all recognized malware attacks from July to December 2016, according to Check Point. Check Point …

healthcare
Is healthcare industry’s security spending focused on the wrong technologies?

Global healthcare IT professionals are confronting a rapidly changing, challenging landscape, with 66% experiencing a data breach and 88% feeling vulnerable as a result. In …

person
Insider threat vs. inside threat: Redefining the term

The traditional meaning of “insider threat” is: a current employee or contractor who, intentionally or accidentally, misuses his or her authorized access to a secure network …

cloud binary
Public cloud services spending to reach $122.5 billion in 2017

Worldwide spending on public cloud services and infrastructure will reach $122.5 billion in 2017, an increase of 24.4% over 2016. Over the 2015-2020 forecast period, overall …

Business ideas
The time to fortify your organization against CNP fraud is now

When it comes to EMV (Europay, MasterCard and Visa) security chip adoption, the United States is the clear laggard. According to EMVCo, only 7.2% of “card present” …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools