Help Net Security

Most activity on the dark web is legal and mundane
Terbium Labs has conducted a data-driven, fact-based research report that looked to identify what’s really taking place on the far corners of the Internet. Total …

When smartphone upgrades go wrong
As the holiday shopping season kicks into full gear around the world, industry analysts predict low prices, discounts and promotions will entice shoppers to buy the latest …

Merchants and financial institutions deal with escalating cyber attacks
Unsurprisingly, the Q3 2016 ThreatMetrix report shows a sharp increase in the number and complexity of cyber attacks. During what is traditionally a slow quarter, researchers …

NullCrew member sentenced to 45 months in prison
A Tennessee man has been sentenced to nearly four years in federal prison for launching cyber attacks on corporations, universities and governmental entities throughout the …

The digital world should mean a change in mindset on security for businesses
Businesses are often encouraged to take risks. These can fuel innovation, excite customers and set them apart from competitors. However, while many parts of a business may …

Integrating threat intelligence with existing security technologies
70 percent of security industry professionals believe threat intelligence is often too voluminous and/or complex to provide actionable insights. Perceptions about the …

65% of Windows devices still running Windows 7, released in 2009
To analyze the current state of device security, Duo Security analyzed more than two million devices, 63 percent of which were running Microsoft operating systems. Seriously …

Most employees violate policies designed to prevent data breaches
Companies are increasing technology investments to protect against external data breaches, but employees pose a bigger threat than hackers, according to CEB. To mitigate the …

Smart machines: Is full automation desirable?
By 2020, smart machines will be a top five investment priority for more than 30 percent of CIOs, according to Gartner. With smart machines moving towards fully autonomous …

Improving business intelligence: The key catalyst is governance
While Business Intelligence (BI) is yielding important benefits for the vast majority of surveyed companies, most feel there is more to come, according to Qlik and Forbes …

Best practices for enterprises to effectively combat cybercrime
Employee training and cyber awareness, combined with a solid defense strategy and best-in-class cybersecurity tools and software, are essential to reducing the risks of data …

Free download – SysAdmin Magazine: Tools & Tips for Security Admins
Every day security administrators monitor networks, support security tools, establish security requirements, perform vulnerability assessments, and much more. SysAdmin …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)