Help Net Security
                                Does hybrid IT offer a competitive advantage?
Hybrid IT is about more than saving money. A survey of IT decision-makers at major financial services, retail, health care, and other organizations found that 50 percent have …
                                Calculate the cost and probability of a DDoS attack
DDoS attacks are becoming increasingly larger, more complex, and perpetrated by cyber extortionist instead of hacktivists and vandals, according to a recent survey from Arbor …
                                The dangers of bad cyber threat intelligence programs
I love a surprise ending in a movie. Whether I’m watching drama, action, or sci-fi, there’s nothing better than a plot twist you can’t predict. At work, however, I feel the …
                                Global IAM market to reach 24.55 billion by 2022
The global identity and access management (IAM) market is expected to reach USD 24.55 billion by 2022, according to Research and Markets. Increased spending by large scale …
                                Week in review: Hackers breaching law firms, ransomware flare-up, and how to get your talk accepted at Black Hat
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Hackers breaching law firms for insider trading info Two of the most …
                                Encryption we can trust: Are we there yet?
Encryption is arguably the most important single security tool that we have, but it still has some serious growing up to do. The current debate about the pros and cons of …
                                SMEs under attack, security readiness still low
When it comes to securing their data, SMEs remain several steps behind their larger counterparts. Some reasons for the disparity in security readiness may be that SMEs have …
                                SideStepper vulnerability can be used to install malicious apps on iOS
Check Point researchers have identified SideStepper, a vulnerability that can be used to install malicious apps on iPhones and iPads to steal login credentials and sensitive …
                                Consumers living in smart homes are willing to sell personal data
A majority of respondents worldwide might be willing to share their personal data collected from their smart home with companies in exchange for money, and 70 percent agree …
                                Linux security isn’t enough to stop data breaches
There is a difference between the security of an operating system and the security of the data created, which is edited and manipulated by people and saved on the operating …
                                NIST security standard to protect credit cards, health information
For many years, when you swiped your credit card, your number would be stored on the card reader, making encryption difficult to implement. Now, after nearly a decade of …
                                Commonly used IoT devices vulnerable to privacy theft
A technical investigation by Bitdefender has discovered that four commonly used Internet of Things (IoT) consumer devices are vulnerable to attack. The analysis reveals that …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down