Help Net Security

Global security software market up 3.7% in 2015
Worldwide security software revenue totaled $22.1 billion in 2015, a 3.7 percent increase in from 2014, according to Gartner. SIEM remained the fastest-growing segment in …

Nearly 1 in 3 consumers victimized by card fraud
Thirty percent of consumers globally have experienced card fraud in the past five years, according to ACI Worldwide and Aite Group. The global fraud study of more than 6,000 …

GDPR could create $320 billion in fines
Unsurprisingly, many consumer products organisations are taking risks with the security and privacy of their customer data. They are failing to put in place proper processes …

Cybersecurity risks in 3D printing
3D printing (i.e. additive manufacturing) is a $4 billion business set to quadruple by 2020. Additive manufacturing builds a product from a computer assisted design (CAD) file …

Malware offers backdoor to critical infrastructure targets
SentinelOne Labs has discovered a new form of malware, which has already infected at least one European energy company. The malware, dubbed SFG, is the mother ship of an …

Keys to successful security vendor collaboration
The IT manager tasked with understanding today’s complex vendor landscape is in an unenviable position. The rapid proliferation of new types of cyber security threats and …

The EU-US Privacy Shield: What happens next?
Yesterday the European Commission formally approved the EU-US Privacy Shield, making transfers of personal data to the US legal under European law for companies that have …

The explosive growth of the IoT security market
The IoT security market is estimated to grow from USD 7.90 billion in 2016 to USD 36.95 billion by 2021, at a CAGR of 36.1%, according to MarketsandMarkets. The major forces …

Network monitoring tips for an increasingly unsafe world
Enterprise IT has evolved significantly over the last decade. Today, IT teams are not only responsible for the availability and performance of their network but also the …
91.1% of ICS hosts have vulnerabilities that can be exploited remotely
To minimize the possibility of a cyber attack, Industrial Control Systems (ICS) are supposed to be run in a physically isolated environment. However this is not always the …

Manage cybersecurity risk by restoring defense-in-depth’s promise
Cybersecurity spending continues to soar, as the current, $75.4 billion worldwide market will increase to $101 billion by 2018, according to projections from Gartner. But how …

What happens to consumer trust when a business is breached?
In this podcast recorded at Infosecurity Europe 2016, Bill Mann, Chief Product Officer at Centrify, talks about what happens to consumer trust when a business is breached. The …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?