Help Net Security
![building](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104924/building-400x200.jpg)
Build security into software up front: Believe it or not, it’s cheaper and faster
“You can pay me now, or you can pay me later” was the tagline of a 1981 ad promoting oil filters. Seems simple, but the implied message was much stronger: It wasn’t about …
![mobile](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101146/mobile_street-400x200.jpg)
Risky business: Are mobile employees compromising business info?
Americans logged 457.4 million trips for business in 2016, and there is no sign of business travel slowing down, with global business travel spend expected to rise 5.8 percent …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101138/gdpr-400x200.jpg)
GDPR Rails: Community GDPR compliance tool
Prey Software announced GDPR Rails, an open source tool set designed to help small to mid-sized businesses comply with the General Data Protection Regulation (GDPR). GDPR …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101149/abstract-400x200.jpg)
Are SMBs driving the adoption of security automation by enterprises?
If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101153/patch-400x200.jpg)
May 2018 Patch Tuesday forecast: Where are the flowers?
The wintry weather doesn’t want to give up its hold on us here in the US. The extended cold has kept the spring flowers from blooming, dragging out the winter blues. It …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112023/face-400x200.jpg)
Which type of biometrics are consumers most comfortable providing?
Consumers feel more comfortable with fingerprint scanning than with other types of biometric technology, including face, eye, voice and other biometric measurements, according …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101202/business-400x200.jpeg)
A smooth transition to the cloud is possible with identity governance
It comes as no surprise that organizations large and small are considering adopting the cloud as part of their overall IT strategy. The variety of impressive benefits that the …
![building blocks](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111907/building_blocks-400x200.jpg)
Organizations should not overestimate the short-term benefits of blockchain
Only 1 percent of CIOs indicated any kind of blockchain adoption within their organizations, and only 8 percent of CIOs were in short-term planning or active experimentation …
![access](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102841/access-400x200.jpg)
SecBI to support Orange Polska in augmenting its managed security services
SecBI announced an agreement with Orange Polska in the field of network security. The strategic partnership was signed following a proof-of-concept (PoC) by SecBI running …
![cryptocurrency](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101752/cryptocurrency-400x200.jpg)
Dig this: The future of crypto-mining botnets
The blockchain sector is now bursting with innovation, with developers looking for new, pragmatic ways to use this secure distributed ledger technology across a range of …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102947/password-400x200.jpg)
Password behaviors remain largely unchanged
Despite today’s increased threat landscape and heightened global awareness of hacking and data breaches, password behaviors remain largely unchanged. Data from a survey …
![mobile user](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101502/mobile_user-400x200.jpg)
Most top travel websites fail to protect user security
Dashlane examined password and account security on 55 of the world’s most popular travel-related sites, and found that 89% of sites leave their users’ accounts perilously …
Featured news
Sponsored
Don't miss
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)