Help Net Security
Attackers posing as legitimate insiders still an enormous security risk
Cyber attacks that exploit privileged and administrative accounts – the credentials used to manage and run an organization’s IT infrastructure – represent the greatest …
Companies leave vulnerabilities unpatched for up to 120 days
Kenna studied the proliferation of non-targeted attacks and companies’ ability to mitigate these threats through the timely remediation of security vulnerabilities in their …
Women represent only 10% of the infosec workforce
Surveying nearly 14,000 global professionals, a new (ISC)2 report focuses on the lack of gender diversity in the information security workforce despite a cyber landscape that …
File insecurity: the final data leakage frontier
The growth of cloud and mobile computing, the ease at which files can be shared and the diversity of collaboration methods, applications and devices have all contributed to …
XOR DDoS botnet launching attacks from compromised Linux machines
Attackers have developed a botnet capable of 150+ Gbps DDoS attack campaigns using XOR DDoS, a Trojan malware used to hijack Linux systems, according to Akamai.What is XOR …
Do security flaws with life-threatening implications need alternative disclosure?
If security researchers get no response from manufacturers when disclosing vulnerabilities with life-threatening implications, the majority of IT security professionals (64%) …
How to avoid data breaches? Start by addressing human error
Small businesses in the UK are failing to train staff on how to correctly identify and dispose of confidential information which could lead to a costly data breach.A Shred-it …
The evolution of the CISO in today’s digital economy
As the digital economy becomes ever more connected and encompasses all industries, we’re reaching a point where every company today is a technology company. Along with this …
Exabeam secures $25 million in Series B funding
Exabeam closed a $25 million financing round to further accelerate the company’s growth and continue updating its user behavior analytics (UBA) solution.Icon Ventures …
How organizations can increase trust and resilience
Gartner said organizations must invest in three risk disciplines to increase trust and resilience. Running a digital business presents business leaders with an increasing …
Silent Circle launches Blackphone 2, delivering business and personal privacy
Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …
Is your network suffering from the trombone effect?
Trombones are wonderful instruments. These brass beauties are mainstays of any marching band, dutifully producing a bouncing bass tone. Some trombones, however, generate a …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down