Help Net Security

Why attaching security to each piece of data is critical
Following in Edward Snowden’s footsteps, yet another NSA contractor has leaked highly classified trade secrets and government information. My question to you: Are we really …

How much is your privacy worth?
How much is your privacy worth? Take for example your bank account number, sort code, name, and address. Is it worth more than £25? Well I think that it is and as a result I …

Security orchestration and automation: Closing the gap in incident response
Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …

Security concerns still undermining mobile payments
Concerns about fraud and theft risks are inhibiting adoption of mobile wallets, but businesses underestimate the problem. The survey found more than half of consumers believe …

Vendor Security Alliance questionnaire: Starting a security discussion with vendors
The interconnection between major organizations and their many service providers is providing a successful, and often ignored, path through which attackers are penetrating …

A closer look at data breach preparedness
While most organizations have a data breach preparedness plan in place, executives are not updating or practicing the plan regularly and lack confidence in its effectiveness, …

DMARC email security is now mandatory for the UK government, what can the enterprise learn?
It’s no secret by now that email has become the number one tool for cyber criminals and fraudsters. Earlier this year the FBI predicted that Business Email Compromise attacks …

Vast phishing campaigns boost global criminal attack footprint
The Anti-Phishing Working Group (APWG) observed a record number of phishing attacks in the second quarter of 2016. APWG observed 466,065 unique phishing websites in Q2. This …

Yahoo security breach highlights the importance of personal protection
The recent breach at Yahoo has proved once again that, regardless of a company’s size and expertise, security is always an issue. In the wake of the incident which left …

Photos: IP EXPO Europe 2016
With six IT events under one roof, 300+ exhibitors and 300+ free to attend seminar sessions, IP EXPO Europe is taking place this week in London, UK. IP EXPO Europe now …

How to close your Yahoo account
In light of the recent massive Yahoo breach an the fact that Yahoo scanned incoming emails on behalf of US intelligence, many are opting to close their accounts to protect …

53% of DDoS attacks result in additional compromise
DDoS attack volume has remained consistently high and these attacks cause real damage to organizations, according to Neustar. The global response also affirms the prevalent …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)