Help Net Security

Email security still an afterthought
Email continues to be a critical technology in business and the threat of email hacks and data breaches loom large over IT security managers. Consequently, confidence and …

Application downtime costing enterprises $16 million each year
Despite numerous high-profile incidents in the last year, enterprises are still not paying enough attention to the needs of their users, according to Veeam. 84 percent of …

Why the C-suite should care about cybersecurity
Many leaders across the C-suite are confused about who the true cybersecurity adversary is and how to effectively combat them. IBM Security interviewed CxOs, from 28 …

Fighting malware monetization and application vulnerabilities
As the traditional network perimeter disappears and attack surfaces grow, security professionals are challenged with protecting users, applications and data – without …

Why a single point of failure should be your primary concern
Many organizations are transitioning to digital systems, which has increased the dependency on cloud service providers, web hosting platforms, and other external services. …

DB Networks launches Layer 7 Database Sensor
DB Networks introduced a product that provides OEM partners with real-time deep protocol analysis of database traffic. By integrating this technology into their products, …

The rise of the Chief IoT Officer
Half of UK businesses (54%) plan to employ a Chief IoT Officer in the next year, especially in the education (63%), retail (63%) and telecomms (64%) industries, according to …

Cyber Risk Board Forum to take place during RSA Conference 2016
RSA Conference has teamed up with NYSE Governance Services to host the Cyber Risk Board Forum. Set to take place February 29, 2016, in San Francisco, in conjunction with the …

Kotlin programming language for JVM and Android reaches version 1.0
Kotlin is an open source programming language for JVM and Android that combines OO and functional features and is focused on interoperability, safety, clarity and tooling …

Security guidance for the Internet of Things
Embedded systems and connected devices are already deeply woven into the fabric of our lives, and the footprint is expanding at a staggering rate. Gartner estimates that 4.9 …

Anonymous networks 101: Into the heart of the Darknet
Here’s a riddle: What’s hidden in plain sight Stretches the entire known world Vilified and Adored Born from a secret US Government project Maintains secret societies Requires …

Week in review: Dyre gang takedown, and the most popular hacking methods
Here’s an overview of some of last week’s most interesting news and articles: Know your enemy: The most popular hacking methods Outsiders want to become insiders …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy