Help Net Security
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093409/android4-400x200.jpg)
Android data sharing remains significant, no opt-out available to users
An in-depth analysis of a range of popular Android mobile phones has revealed significant data collection and sharing, including with third parties, with no opt-out available …
![endpoint protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/23100505/endpoint-protection-400x200.jpg)
70% of businesses can’t ensure the same level of protection for every endpoint
A Deep Instinct research, which seeks to discover the cybersecurity concerns keeping CISO’s and SecOps professional up at night, found that 86% of UK respondents believe …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094840/phishing1-400x200.jpg)
Human hacking increased as apps and browsers moved completely to the cloud
Human hacking – phishing attacks across all digital channels – has dramatically increased in 2021. SlashNext released its first report showing a 51% increase in attacks …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093759/arrow-400x200.jpg)
Finance data management initiatives constrained by lack of digital skills and maturity
Data management initiatives in the finance sector, such as data collection, integration, and automation, are being constrained by a severe lack of digital skills and maturity. …
![account](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/21085008/account-hand-400x200.jpg)
Organizations failing to give users the login experience they want
Companies often claim to be customer-centric, or even customer-obsessed, striving to offer technologies that their users demand. However, the findings of a recent global Auth0 …
![What is CCPA?](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14095059/what_is_ccpa-400x200.jpg)
Whitepaper: What is CCPA and how can it affect your business?
Learn about California’s Consumer Privacy Laws and Regulations (CCPA and CPRA), what is their impact on your security and how to comply with their essential …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Add a new dimension to ransomware defenses
Ransomware is a particularly heartless endeavor. Criminals have targeted schools, vital infrastructure, and even patient records at a psychiatric treatment facility. The US …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102855/stop-400x200.jpg)
Organizations losing business due to connected product security concerns
59% of executives with cybersecurity decision-making responsibility at large and mid-sized companies say that their organizations have lost business due to product security …
![ThreatMapper](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/11100435/threatmapper-1280-400x200.jpg)
ThreatMapper: Open source platform for scanning runtime environments
Deepfence announced open source availability of ThreatMapper, a signature offering that automatically scans, maps and ranks application vulnerabilities across serverless, …
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
Everyday cybersecurity practices inadequate among many online consumers
Bitdefender released a report which reveals how consumers across various age groups and socio-demographic backgrounds behave on popular platforms, applications and devices, …
![struggle](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104202/struggle-400x200.jpg)
Fintech developers dissatisfied with their current roles, a major risk for their employers
Rapyd published a report conducted by 451 Research, to assess the market dynamics of fintech developers around the world. Key findings in the report include a growing demand …
![backup](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/25124009/backup-storage-400x200.jpg)
Storage systems vulnerabilities: Act now to avoid disasters
Continuity issued a research report which provided an analysis of the vulnerabilities and misconfigurations of enterprise storage systems. The findings revealed that storage …
Featured news
Sponsored
Don't miss
- Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
- Cross-industry standards for data provenance in AI
- Shuffle Automation: Open-source security automation platform
- Cyber insurance 2.0: The systemic changes required for future security
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update