Help Net Security
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
Smart car security: Good practices to improve car safety
The automotive industry is undergoing an evolution towards connected and autonomous vehicles. Increasingly smart cars include added features that enhance users’ experience or …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Growing complexity is driving operational changes to privacy programs
A majority of companies are adopting a single global data protection strategy to manage evolving privacy programs, and that managing the expanding ecosystem of third parties …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093814/user-400x200.jpg)
Developers worry about security, still half of teams lack an expert
While nearly 75% of developers worry about the security of their applications and 85% rank security as very important in the coding and development process, nearly half of …
![shopping](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105726/shopping_cart-400x200.jpg)
Cybercriminals targeting e-commerce website vulnerabilities this holiday season
Expect unprecedented levels of online data theft this holiday season due to a lack of deployed client-side security measures. Disturbing lack of security measures Tala …
![future](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105715/future-400x200.jpg)
Data security and automation top IT projects for 2020, AI not a priority
Data security and automation are the top IT projects for 2020, while artificial intelligence projects are not in the top 10 for IT professionals, according to Netwrix. The …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094406/cloud1-400x200.jpg)
Week in review: Public cloud performance, new G Suite security options, how to build a successful SOC?
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Women in cybersecurity can benefit from taking inventory of their personal …
![vote](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103908/vote-400x200.jpg)
Arlo: An open source post-election auditing tool
The Cybersecurity and Infrastructure Security Agency (CISA) is teaming up with election officials and their private sector partners to develop and pilot an open source …
![collaboration](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094807/collaboration-1-400x200.jpg)
Cyber threats continue to evolve, but security teams remain confident
Coming off of a year of major data breaches making headline news, it’s easy to draw the conclusion that security teams are losing the cybersecurity battle, a DomainTools …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112845/person-400x200.jpg)
Risky behavior exposes consumers to seasonal security scares
In advance of the peak shopping season, a study from PCI Pal shows that millions of Americans continue to over-indulge in risky behaviors – both online and on the phone, …
![IoT connection](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104554/iot-connection-400x200.jpg)
Create secure IoT products: Enable security by design
Good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime have been introduced …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100013/user-400x200.jpg)
Do third-party users follow security best practices and policies?
Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095949/tunnel-400x200.jpg)
Driving collaboration between security and IT ops teams is a major challenge
Strained relationships between security and IT ops teams leave businesses vulnerable to disruption, even with increased spending on IT security and management tools, a Tanium …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege