Help Net Security
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112829/money-laptop-400x200.jpg)
Gartner unveils IT cost-optimization priority for CIOs
IT cost optimization in most organizations is now largely focused on business optimization rather than cost cutting, according to a recent survey by Gartner. Survey …
![stock price](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104355/stock_price-400x200.jpeg)
AI services market to reach $188 billion worldwide by 2025
Artificial intelligence (AI) has worked its way into a variety of industries, from the obvious (autonomous vehicles) to the hidden (anti-money laundering due diligence). But …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101610/keys-400x200.jpg)
Why PKI will secure the Internet of Things for years to come
A long, long time ago, nearly 4,000 years, in a land far, far away ancient cryptography was born. The Place? Egypt. It is there historians believe the technique was invented …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101613/cloud-1-400x200.jpg)
Have you evaluated the cost of a cloud outage?
New findings from a study by Veritas Technologies, indicate that 60 percent of respondents have not fully evaluated the cost of a cloud outage to their business and are …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113858/abstract-400x200.jpg)
Week in review: Big data and insurance, wireless standards hackers will target after Wi-Fi
Here’s an overview of some of last week’s most interesting news and articles: Malicious activity surges coincide with geopolitical events 2017 was a year of …
![Face](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101617/face-dark2-400x200.jpg)
The great attribution debate: Why we should focus on HOW not WHO
Organisations often don’t understand what they need to be protecting themselves from when it comes to costly cyber-attacks. The threat landscape is becoming ever-more …
![100 dollars](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101622/100dollars-400x200.jpg)
Cybercriminals launder money through mansions, private islands and crypto currency
Cybercriminal proceeds make up an estimated 8-10 percent of total illegal profits laundered globally, amounting to an estimated $80-$200 billion each year, according to a …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110430/business-400x200.jpg)
Research explores minority representation within the cybersecurity field
A new (ISC)2 report measures minority representation in the U.S. cybersecurity profession and aims to understand the challenges these highly skilled individuals experience. …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112242/abstract-400x200.jpg)
IT leaders wrestling hyper-converged infrastructure security
New research from WinMagic, surveying over 1,000 IT Decision Makers (ITDM) about hyper-converged infrastructure (HCI) has revealed flexibility (65%), performance (58%) and …
![Meltdown](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101625/meltdown-400x200.jpg)
Meltdown and Spectre will delay patching for most organizations
Complexity and challenges associated with the Spectre and Meltdown patches will result in companies delaying future patch rollouts, according to Barkly. 72% of organizations …
![PCI Council](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102039/pci_council-400x200.jpg)
The PCI SSC QIR program is changing to help merchants reduce risk
The PCI Security Standards Council (PCI SSC) announced new changes to the PCI Qualified Integrators and Resellers (QIR) Program in response to industry feedback and data …
![Speed](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101632/speed-400x200.jpg)
Big data and insurance: Implications for innovation and privacy
The use of big data analytics in insurance offers societal benefits, as improved understanding of risks can inform risk reduction and enhance insurability. However, …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes