Help Net Security
Practical applications of machine learning in cyber security
As more and more organizations are being targeted by cyber criminals, questions are being raised about their planning, preparedness, and investment into cyber security in …
Cloud security best practices during all phases of the infrastructure lifecycle
In the era of cloud technology, online attacks are becoming more sophisticated. The days of drive-by exploitation are passing us by, replaced by attackers who run continuous …
New domains revive old spam
The new generic top-level domain (gTLD) registration program, launched in January 2014 and intended for use by relevant communities and organizations, has proved irresistible …
Organizations lack control over mobile workspaces
More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …
The slow death of static security detections: Beginning of SIEM deployments
Machines both mechanical and electric have always been good at counting things. Ask anyone from an earlier generation who still uses a Victor Champion adding machine from the …
Can you correctly identify phishing emails?
An Intel Security quiz presented ten emails and asked respondents to identify which of the emails were phishing attempts designed to steal personal information and which were …
CIOs are distracted by the business of keeping the lights on
75 percent of CIO respondents to a global survey stated their network is an issue in achieving their organizations goals. For almost a quarter of CIO’s polled, it is a …
Man charged with attempted spear-phishing attack on U.S. Department of Energy
An indictment is charging a former employee of the U.S. Department of Energy and the U.S. Nuclear Regulatory Commission (NRC) with a total of four felony offenses in …
Increasing cloud adoption will drive IT innovation
DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to …

Do you know where your sensitive data lives?
The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with …
Defend your network from APTs that exploit DNS
Advanced Persistent Threats (APTs) are designed to spread, morph and hide within IT infrastructure to perpetrate a long term attack, posing a significant threat to the …
IoT and the great data heist
The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)