Help Net Security
13 countries join global ransomware fight
Just three months after the successful launch of the No More Ransom project, law enforcement agencies from a further 13 countries have signed up to fight ransomware together …
Democracy for the Internet of Things
In the past I’ve written a number of times on the way that the IoT potentially changes the relationship between governments and their constituents – and a profound change that …
Cyber Europe 2016: Analyzing realistic cybersecurity incidents
The European ICT Industry is one of the most advanced in the world. Making the EU’s single market fit for the digital age could contribute €415 billion per year to the …
Week in review: Social media surveillance, ransomware recovery, US accuses Russia of hacking
Here’s an overview of some of last week’s most interesting news, reviews and articles: Twitter, Facebook revoke access to social media surveillance software used …
How to implement an EFSS ransomware recovery plan
Ransomware attacks are at an all-time high, and security experts warn it has become a matter of “when” not “if” your company will be breached. The number of victims has grown …
Alarming cloud encryption misconceptions revealed
Businesses have a high level of concern about the exposure of sensitive and regulated data in the cloud to security threats. Yet despite this, the majority of data owners …
Worldwide security technology revenue to surpass $100 billion in 2020
Worldwide revenues for security-related hardware, software, and services will grow from $73.7 billion in 2016 to $101.6 billion in 2020. This represents a compound annual …
1 in 5 executives take risks with sensitive data to meet regulatory demands
The Anti-Money Laundering Directive (AML), the EU-US Privacy Shield and the Market Abuse Directive (MAD) and Regulation (MAR) are the three biggest regulatory pressures across …
New Linksys WRT3200ACM open source Wi-Fi router is optimization ready
Linksys announced the next generation of its one and only WRT router – the WRT3200ACM. It features Tri-Stream 160 technology creating the fastest Dual Band router …
How identity and access management is critical in the digital transformation process
Digital transformation is a top priority and source of anxiety for enterprises, but the majority of IT decision makers have not completed technology deployments to address the …
Global cyber security leaders to gather in Berlin
A series of reports over the summer have shown not only that cybercrime is more persistent than ever, but there are also more opportunities. The growth of technology, …
Ubuntu 16.10 released with hybrid cloud operations and Unity 8 developer preview
Released today, Ubuntu 16.10 comes with hybrid cloud operations, bare-metal cloud performance, the ability to lift-and-shift 80% of Linux VMs to machine containers, Kubernetes …
Featured news
Resources
Don't miss
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount