Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
PC
Java and Flash top list of most outdated programs on users’ PCs

52% of the most popular PC applications, including Flash and Java, are out-of-date. People are exposing their PC and their personal data to risks, as malware targets older …

arrows
Will most security operations transition to the cloud?

Companies across industries are increasingly leveraging the cloud for security applications, with 42 percent indicating they currently run security applications in the cloud …

authentication
Online banking customers remain extremely frustrated with passwords

A new survey by iovation and Aite Group, polled nearly 1,100 consumers across four generations who use online and/or mobile banking platforms to better understand their …

DevSecOps
Software development teams embrace DevSecOps automation

Mature development organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale, according to Sonatype. The adoption of DevOps …

hybrid IT
Hybrid IT is becoming a standard enterprise model

Dimension Data research of 1,500 IT decision makers from multiple vertical industries across the US, Europe, Asia-Pacific and South Africa, reveals that hybrid IT is becoming …

risk
Managing third-party risk: Dominant trends

One in five organizations has faced significant risk exposure due to a third party in the last 18 months. Of those who shared loss data, 25% said that the loss impact was …

password unlock
Organizations still vulnerable to brute force attacks

While increases in malware are clearly a major threat to both enterprises and service providers, network complexity is creating its own vulnerability, according to Ixia. The …

robot
Bad bots attack 96% of websites with login pages

Almost every website with a login page is under attack from bad bots, the automated programs used to carry out a variety of nefarious activities, according to Distil Networks. …

brain
What impact will artificial intelligence have on business?

Tata Consultancy Services polled 835 executives across 13 global industry sectors in four regions of the world, finding that 84% of companies see the use of AI as …

tech
Adoption of advanced technology continues quickly despite security gaps

93% will use sensitive data in an advanced technology (defined as cloud, SaaS, big data, IoT and container) environments this year. 63% of those also believe their …

woman
There’s a chronic shortage of women in information security

A survey of over 19,000 cybersecurity professionals has revealed a chronic shortage of women working in the cybersecurity amid a widening skills gap, with women forming just …

documents
Securing document flow: Exploring exposure and risk

There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the BPI …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools