Help Net Security
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104208/IoT-400x200.jpg)
IoT connections to grow 140%, will reach 50 billion by 2022
New data has revealed that the total number of connected IoT sensors and devices is set to exceed 50 billion by 2022, up from an estimated 21 billion in 2018. Juniper Research …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104308/cloud-paper-400x200.jpg)
Compliance worries prevent greater cloud use
New research released by WinMagic shows that 87% of ITDMs limit their use of the cloud because of the complexity of managing regulatory compliance. A quarter said, it meant as …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100825/money-400x200.jpg)
Has paying the ransom become business as usual?
Radware released its 2018 Executive Application and Network Security Report. For the first time in the survey’s five-year history, a majority of executives (53%) reported …
![server](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100814/server-400x200.jpg)
Cost of lagging DevOps and microservice enablement? $34 million per year
Despite the vast majority of cloud management decision-makers believing that DevOps and microservice enablement are important, very few believe that their organizations are …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
Banks planning further integration of regulatory data
Most global banks are planning to integrate their regulatory workflow data. But keeping up to date with the fast pace of regulatory change, as well as staying compliant with …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100833/password-400x200.jpg)
How employee behavior impacts cybersecurity effectiveness
A recent OpenVPN survey discovered 25 percent of employees, reuse the same password for everything. And 23 percent of employees admit to very frequently clicking on links …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101759/gdpr-1-400x200.jpg)
With the GDPR, companies face new era of compliance and transparency
A new Avecto survey explored IT and security’s role in helping companies achieve compliance with the new guidelines for the collection and processing of personal …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102804/hands-400x200.jpg)
Protecting consumers from mobile and IoT threats
A new report by Allot Communications revealed a dynamic and automated threat landscape in which consumers lack the security expertise to effectively protect themselves. Mobile …
![servers](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100835/servers-400x200.jpg)
Worldwide server revenue grew 33.4% in Q1 2018
The growth at the end of 2017 continued for the worldwide server market in the first quarter of 2018 as worldwide server revenue increased 33.4 percent and shipments grew 17.3 …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100838/lock-400x200.jpg)
Securing microservices and containers: A DevOps how-to guide
There is a simple reason for developers adopting the cloud and cloud-native application architectures. These “tools and methods” allow developers to accelerate innovation and …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100840/patch-400x200.jpg)
Patch management is not just IT’s responsibility, get your whole team on board
I have been on the road for a few weeks now and surprisingly the topic of discussion has predominantly been patch management. Why is patch such a prevalent topic? Patching …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103547/general-400x200.jpg)
Week in review: Zip Slip, GDPR and the US, why creativity is key to security
Here’s an overview of some of last week’s most interesting news and articles: VPNFilter malware targets new devices, can deliver exploits to endpoints Cisco Talos …
Featured news
Sponsored
Don't miss
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)
- Review: Action1 – Simple and powerful patch management