Help Net Security
![Market](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110144/market-grow-400x200.jpg)
Big predictions for sensors in the global security and surveillance market
The Internet of Things (IoT) is bringing about a new era of connectivity in the digital age, connecting critical business sectors through a network of secure data flow, …
![structure](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103902/structure-red-400x200.jpeg)
Week in review: DoS attacks against hard disk, ethical hacking, and the rise of ransom hacks
Here’s an overview of some of last week’s most interesting news and articles: Norwegian health authority hacked, patient data of nearly 3 million citizens possibly …
![cloud spending](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102111/cloud-spending-400x200.jpg)
IT infrastructure spending for cloud environments to reach $46.5 billion in 2017
Total spending on IT infrastructure products (server, enterprise storage, and Ethernet switches) for deployment in cloud environments is expected to total $46.5 billion in …
![HITBSecConf](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113642/hitb-2016ams-400x200.png)
HITB Security Conference in Amsterdam to feature innovative research on attack and defense topics
The agenda for Day 1 of the 9th annual HITB Security Conference in The Netherlands has been announced and it’s packed with cutting edge research on a range of attack and …
![HackerOne](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102118/hackerone-400x200.jpg)
Is ethical hacking more lucrative than software engineering?
HackerOne published its 2018 Hacker Report, which examines the geography, demographics, experience, tools used and motivations of nearly 2,000 bug bounty hackers across 100 …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105947/architecture-400x200.jpg)
How digital transformation is reshaping the modern enterprise
F5 Networks announced the results of its 2018 State of Application Delivery report, which shows accelerating multi-cloud deployments are enabling organizations to select the …
![One Identity - Balabit](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102123/oneidentity_balabit2-400x200.jpg)
One Identity acquires Balabit to bolster PAM solutions
One Identity announced the acquisition of Balabit, terms of the transaction were not disclosed. Balabit’s PAM solution provides protection from threats posed by high-risk, …
![Europe](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104050/europe-400x200.jpg)
Why GDPR will drive a best practice approach
When GDPR was first discussed, many feared that it would force businesses to act more insular and become more defensive about their data. Some even believed there would be a …
![Oracle](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104527/oracle-400x200.jpg)
Oracle addresses 237 vulnerabilities across multiple products
The January 2018 Oracle Critical Patch Update (CPU) fixes 237 new security vulnerabilities across hundreds of Oracle products, including the company’s widely used Oracle …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102125/identity2-400x200.jpeg)
Insights from 700M thwarted cyberattacks show how the fight against cybercrime has intensified
2017 was a record-setting year in the fight against cybercrime. Based on analysis of real world cybercrime attacks, ThreatMetrix confirmed a 100 percent increase in volume of …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112829/money-laptop-400x200.jpg)
Global IT spending to reach $3.7 trillion in 2018
Worldwide IT spending is projected to total $3.7 trillion in 2018, an increase of 4.5 percent from 2017, according to the latest forecast by Gartner. “Global IT spending …
![Stackhackr](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102144/stackhackr-400x200.jpg)
Stackhackr: Free malware simulation tool
Stackhackr lets you create and customize your own mock malware that simulates malicious behavior — without actually doing any harm on your machine. It’s a quick and safe way …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes