Help Net Security
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100537/cloud-1-400x200.jpg)
Most enterprises hit cloud migration problems, still run apps on legacy operating systems
More than nine out of 10 of US enterprises in the Dow Jones, Fortune 250 and 500, and S&P 100 have run into cloud migration problems when it comes to moving legacy …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113858/abstract-400x200.jpg)
Week in review: 5G IoT security, efficient password cracking for pentesters, supply chain examination
Here’s an overview of some of last week’s most interesting news and articles: 5G IoT security: Opportunity comes with risks Slowly but surely, 5G digital cellular …
![Cyber Smart](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/04163014/book-cyber_smart-400x200.jpg)
Review: Cyber Smart
Do you believe you’re not interesting or important enough to be targeted by a cybercriminal? Do you think your personal data doesn’t hold any value? Bart R. McDonough proves …
![ecommerce](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/05094040/ecommerce-400x200.jpg)
Nearly half of consumers worry about being tricked by fraudsters this holiday season
There has been a 29% increase in suspected online retail fraud during the start of the 2019 holiday shopping season compared to the same period in 2018, and a 60% increase in …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094714/compliance-400x200.jpg)
Top compliance and risk management challenges for financial organizations
Notable regulatory compliance and risk challenges remain high in a number of key areas for U.S. banks and credit unions, according to the results of a Wolters Kluwer survey. …
![Europe](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104050/europe-400x200.jpg)
Exploring the proper use of pseudonymisation related to personal data
In the light of the General Data Protection Regulation (GDPR), the challenge of proper application of pseudonymisation to personal data is gradually becoming a highly debated …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
Avoiding the next breach: Four tips for securing your apps
As security incidents continue to be an ongoing threat to businesses on a daily basis, keeping security procedures up-to-date and avoiding the next breach have become …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
The rise of continuous crowdsourced security testing for compliance
A large percentage of organizations and institutions are moving toward a rigorous, continuous testing model to ensure compliance, a Synack report reveals. As part of this …
![Earth](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/04132742/earth-space-400x200.jpg)
2020 predictions: Rising complexity of managing digital risk
Digital risk management experts at RSA Security have released their predictions for 2020, detailing key cyber trends for the year ahead. With contributions from President, …
![contactless payment](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/04183624/contactless_payment-400x200.jpg)
CPoC: New data security standard for contactless payments
The PCI Security Standards Council (PCI SSC) published a new data security standard for solutions that enable merchants to accept contactless payments using a commercial …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095922/network1-400x200.jpg)
How DNS filtering works and why businesses need it
The Domain Name System (DNS) is a cornerstone of the internet. DNS servers connect URL names that humans can read to unique Internet Protocol (IP) addresses that web browsers …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101759/gdpr-1-400x200.jpg)
Despite potential fines, GDPR compliance rate remains low
58% of surveyed businesses worldwide failed to address requests made from individuals seeking to obtain a copy of their personal data as required by GDPR within the one-month …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege