Help Net Security

Developing the perfect exfiltration technique
At SafeBreach, one of our major research areas is exfiltration (sending sensitive data out of the corporate network). In one of our research projects in late 2015, we set out …

The inconvenient truth about API security
Ovum Consulting asked IT and security professionals across a variety of industries globally about their use of APIs, adoption of API management platforms, and the security …

Are your vendors leaving you vulnerable?
Third-party vendors can be a significant security risk if their access to IT systems are not managed and monitored correctly, according to Bomgar. The new study explores the …

Week in review: Panama Papers, dark web mapping, WhatsApp end-to-end encryption
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Panama Papers breach was the result of lax security practices? News items …

Surge in cyber attacks on the energy sector
A new survey conducted by Dimensional Research, which was carried out in November 2015, assessed cyber security challenges faced by organizations in the energy sector. Study …

Consumer concerns of a connected world
While consumers see the tangible benefit of IoT (just 1 consumer in 10 says a world of connected devices won’t deliver such value), more than half also harbour concerns …

Lack of backup tech hinders next-generation database adoption
While there is immediate and increasing interest in evolving infrastructure to support distributed, scale-out databases and cloud databases, a lack of robust backup and …

Worldwide IT spending to decline this year
Worldwide IT spending is forecast to total $3.49 trillion in 2016, a decline of 0.5 percent over 2015 spending of $3.5 trillion, according to Gartner. This is down from last …

Who owns corporate data? Employees think they can just take it
A third of all employees believe they own – or share ownership of – the corporate data they work on, with half thinking they can take the data with them when they …

Developing a mobile health app? Check which federal laws apply
The Federal Trade Commission has created a new web-based tool for mobile health app developers, which is designed to help the developers understand what federal laws and …

eBook: Guide to protecting SaaS apps from DDoS attacks
With a business model dependent on 100% uptime for their online customers, the last thing SaaS companies can afford is a DDoS attack. Read this DDoS eBook from Incapsula and …

The security impact of IoT evolution
Francis Bacon, First Viscount St. Alban (1561 – 1626), wrote, “As the births of living creatures, at first are ill-shapen, so are all innovations, which are the births of …
Featured news
Resources
Don't miss
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days