Help Net Security
Cybercriminals select insiders to attack telecom providers
Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to Kaspersky Lab. In addition, these criminals are also …
Privileged user abuse and the insider threat
Although insider leaks and attacks continue to multiply, a Ponemon Institute study found that 58 percent of IT operations and security managers believe their organizations are …
Linux kernel development: How fast it’s going and who is doing it
The Linux Foundation analyzed the work done by over 13,500 developers over more than a decade, to provide insight into the Linux kernel development trends and methodologies …
Shadow Brokers, digital attacks, and the escalation of geopolitical conflict
Last week’s data dump by the Shadow Brokers has left many wondering how the US will respond. This is just the latest in a series of politically motivated data breaches often …
Global cyber security market: Competition forecast and opportunities
Increasing cyber attacks on the critical infrastructure has rendered worldwide security at risk. The prime motive behind these attacks is to gain access to financial …
Passwords, biometrics and multi-factor verification: What businesses need to know
Verifying identity is a double headache for small businesses. On the one hand, there’s the question of identity verification within your organization. You need to be sure only …
The deception technology market is exploding
The global deception technology market is expected to generate a revenue of USD 1.33 billion by 2020, according to Technavio. Deception technology was introduced as an …
Week in review: Hacking smart cities, leaked hacking tools, and detecting hardware Trojans
Here’s an overview of some of last week’s most interesting news and articles: eBook: Defending against crypto ransomware Download your copy of the Defending …
Access governance holds the security line
We must continue to hold the line, and we are, in this war on information security. We must continue to find our stride and take steps forward in regard to technology …
Is security enabling or compromising productivity?
While most organizations fundamentally believe connecting people to the best technology is vital to business productivity, many struggle to achieve agility due to traditional …
Banking customers hesitant to use mobile features due to security concerns
Banking customers are hesitant to use mobile features due to fraud and security concerns, according to Kaspersky Lab and IDC Financial Insights. Their findings show that of …
The state of security? No one cares about a breach
In an election year, everyone asks the question about whether or not you are better off than you were four years ago. There are many ways to answer such a question, and …
Featured news
Resources
Don't miss
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount