Help Net Security

Managing third-party risk: Dominant trends
One in five organizations has faced significant risk exposure due to a third party in the last 18 months. Of those who shared loss data, 25% said that the loss impact was …

Organizations still vulnerable to brute force attacks
While increases in malware are clearly a major threat to both enterprises and service providers, network complexity is creating its own vulnerability, according to Ixia. The …

Cyber insurance: What and why?
High-profile cyber-attacks are fast becoming the norm in modern society, with 2016 being arguably the worst year for major security breaches. National Crime Agency statistics …

Week in review: WhatsApp flaw, lip motion passwords, reinventing software patching
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Vulnerability in WhatsApp and Telegram allowed complete account takeover …

IoT and the resurgence of PKIs
With the digital revolution in full swing, security methods and models need to be re-evaluated to better address both the changing nature of enterprise architectures and …

Bad bots attack 96% of websites with login pages
Almost every website with a login page is under attack from bad bots, the automated programs used to carry out a variety of nefarious activities, according to Distil Networks. …

What impact will artificial intelligence have on business?
Tata Consultancy Services polled 835 executives across 13 global industry sectors in four regions of the world, finding that 84% of companies see the use of AI as …

Adoption of advanced technology continues quickly despite security gaps
93% will use sensitive data in an advanced technology (defined as cloud, SaaS, big data, IoT and container) environments this year. 63% of those also believe their …

There’s a chronic shortage of women in information security
A survey of over 19,000 cybersecurity professionals has revealed a chronic shortage of women working in the cybersecurity amid a widening skills gap, with women forming just …

Data breaches: Playing by a new set of rules?
Tell me, what’s your response when you hear that a company that was breached are now losing customers? I suppose it’s at this point the word reasonable makes an appearance. …

Securing document flow: Exploring exposure and risk
There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the BPI …

Hack In The Box announces keynotes for 2017 Amsterdam event
Hack In The Box announced an exciting line-up for its annual security conference taking place in Amsterdam on April 13th and 14th. Groundbreaking security research covering …