Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Why enterprise security priorities don’t address the most serious threats

In 2015, enterprises will spend more than $71.1 billion on information security – more than they have ever spent before, according to Gartner Group figures. Yet, the incidence …

Employees embrace BYOD, but still worry about privacy

The findings of a new survey from Tyntec, based on responses from Spain, the UK and US, reveal sluggish adoption of BYOD policies by organizations, while its employees voice …

The most damaging ramifications of DDoS attacks

More than half of IT security professionals (52 percent) said loss of customer trust and confidence were the most damaging consequences of DDoS attacks for their businesses, …

CFOs are not confident about their level of security

CFOs’ long-term outlook for the North American economy remains strong despite their weakening confidence in their own companies’ prospects, according to Deloitte. Lower …

The soaring cost of malware containment

“Organizations are dealing with nearly 10,000 malware alerts per week, however, only 22% of these are considered reliable, according to a new report from The Ponemon …

Identifying the five principal methods of network attacks

Companies are underestimating the risk of failing to provide security training to non-technical staff.A new Intel Security study, which surveyed IT decision makers in …

Naked pictures or financial info? Users would rather thieves stole the former

Every day it seems information security is ruling the headlines, Americans are (perhaps understandably) feeling insecure about the security of their financial information. In …

IIS 6.0 users are heading towards new security dangers

RiskIQ has discovered that 24 of the top 30 FTSE-listed companies in the UK are running web servers that will be out of support in less than a week, posing a potential …

Risk management programs lack maturity, new strategies needed

With cyber attacks and data security threats looming at insecure access points, the increased scrutiny of regulators and the focused attention of boards of directors, the …

Threat intelligence: Sources, sharing, utilization and the government

More than three quarters of IT security professionals (81%) believe the government should be sharing more threat intelligence information with the private sector, according to …

A closer look into the piracy ecosystem

Illegal reproduction and distribution of copyrighted material on the Web is booming as a result of security breaches in both mobile and desktop software applications.Arxan and …

Rise in DDoS reflection attacks using abandoned routing protocol

There’s been an increase in the use of outdated Routing Information Protocol version one (RIPv1) for reflection and amplification attacks, according to Akamai.RIPv1 is a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools