Help Net Security

Five ways to prevent data leaks
The story still strikes fear into the hearts of IT departments: As many as 70 million credit- and debit card accounts were compromised in less than a month during the Target …

Six critical customer support differentiators in cybersecurity
Regardless of size or sector, excellent customer support is a major differentiator within any organization. In the cybersecurity industry, however, tech support is more than a …

Inline SSL solution eliminates network blind spots
At RSA Conference 2017, Gigamon announced an expansion to its GigaSECURE SSL/TLS Decryption solution, with new inline capabilities, bringing enhanced visibility into encrypted …

Advanced machine learning platform preemptively identifies attack pathways
At RSA Conference 2017, illusive networks announced the illusive Deception Management System (DMS), a machine learning platform that preemptively identifies attack pathways …

Week in review: Fileless malware, HTTPS interception in the wild, simple Gmail spoofing
Here’s an overview of some of last week’s most interesting news, reviews and articles: Banks around the world hit with fileless malware Kaspersky Lab researchers …

The anti social network
Let’s be honest. Our online world is judged on how others view us, or as the psychologist Caldini would put it social validation. Want to buy a product? Well how many people …

Will February’s Patch Tuesday fix a known zero-day?
Coming into Patch Tuesday we have a known zero day on the Microsoft side, and we’ve seen example code for an SMB exploit that could lead to DoS and BYOD of a system. US …

CERT updates insider threat guidebook
The CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University released the fifth edition of the Common Sense Guide to Mitigating Insider Threats. …

Vera for Mail protects the confidentiality of email messages and attachments
Vera for Mail is an enterprise-grade security solution that lets businesses secure, track, and revoke access to any email they send. Built on Vera’s data-centric security …

LaunchKey: Passwordless consumer authentication at scale
iovation announced its LaunchKey mobile multifactor authentication solution. It empowers global consumer brands to improve security and consumer experience by delivering a …

DDoS attacks increasingly form blended attacks of more vulnerabilities
DDoS attacks increasingly formed blended attacks of four or more vulnerabilities over the course of the fourth quarter of 2016, with an intent to overload targeted monitoring, …

Less than half of organizations trust their data for business decisions
Data is being used by businesses in more ways than ever before, but they still lack trust in their data. While data supports major business initiatives, the level of data …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface