Help Net Security
![traffic](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110652/traffic-400x200.jpg)
Do public clouds make it more difficult to get visibility into data traffic?
The second annual Ixia 2018 Security Report analyzes how enterprise network attack surfaces are increasing as the perimeter of the traditional network expands into the cloud. …
![sharing](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101707/sharing-400x200.jpg)
New DNS encryption tools accelerate privacy online
Brand new Domain Naming Service (DNS) Cloudflare is gaining firm ground among internet users. Unlike many other DNS providers, Cloudflare positions itself as a strictly …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101209/bot-400x200.jpg)
Public breaches drive increase in account takeover attempts
Distil Networks released The 2018 Anatomy of Account Takeover Attacks Report, based on data from 600 domains that include login pages. The study revealed that all monitored …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102647/gdpr-2-400x200.jpg)
Time is running out, yet many US companies are not GDPR-ready
A significant percentage of US companies are uncertain about or unprepared for the European Union’s General Data Protection Regulation (GDPR) that takes effect later this …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105427/abstract-400x200.jpg)
CEO priorities are shifting to embrace digital business
Growth tops the list of CEO business priorities in 2018 and 2019, according to a recent survey of CEOs and senior executives by Gartner. However, the survey found that as …
![world danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101905/world-danger-400x200.jpg)
Strengthening information security to protect against fake news
Online disinformation, also refered to as “fake news”, has recently received a lot of attention as a potential disruptor of democratic processes globally. There is a need to …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104135/architecture-400x200.jpg)
Why good security foundations are better than the best security mitigation
Since founding VDOO, we have been working to analyze a great many IoT devices, in the broadest way possible. The more we look into these devices and find their …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102230/wifi-400x200.jpg)
Wi-Fi honeypots: Alive and well at RSAC 2018
It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
Should governments regulate social media data collection?
Venafi announced the results of a survey querying 512 security professionals attending RSA Conference 2018. The survey evaluated opinions on the intersection of cyber …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103744/GDPR-400x200.jpg)
Unsurprisingly, most won’t be ready for GDPR on 25th May
With less than a month until the GDPR comes into force, many companies will not be ready when it takes effect on May 25th, 2018. 62% of IT Decision Makers (ITDMs) surveyed …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
Only half of CI/CD workflows include appsec testing elements
Only half of CI/CD workflows include application security testing elements despite respondents citing awareness of the importance and advantages of doing so, according to a …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
Adoption of security ratings platforms is on the rise
Forrester Consulting surveyed 158 security leaders to evaluate how enterprises are assessing and managing security threats to their IT infrastructure, as well as to their …
Featured news
Sponsored
Don't miss
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)