Help Net Security
![Axonius platform](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103300/axonius-platform-400x200.jpg)
Axonius announces $4M seed round to secure the explosion of connected devices
Israeli startup Axonius today announced $4 million in seed funding for its mission to secure and manage the growing billions of connected devices in use by businesses. Backing …
![virtual reality](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112824/virtual_reality-400x200.jpg)
Hacking virtual and augmented reality: Short-term FUD, long-term danger
I believe virtual reality (VR) and augmented reality (AR) are on the cusp of mass success, and will dramatically change the way we use technology. However, with new technology …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103229/gdpr-400x200.jpg)
GDPR awareness: 1 in 5 businesses claim a fine wouldn’t bother them
With the General Data Protection Regulation (GDPR) taking effect May 25, 2018, businesses around the globe should be preparing accordingly. However, through a recent survey, …
![Lenovo](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103227/lenovo-400x200.jpg)
Lenovo settles FTC charges it harmed consumers with preinstalled software
Lenovo has agreed to settle charges by the Federal Trade Commission and 32 State Attorneys General that the company harmed consumers by pre-loading software on some laptops …
![ATM](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103235/atm-400x200.jpg)
Consumers need to stay alert as skimming grows
The number of cards compromised at U.S. ATMs and merchants rose 39 percent in the first six months of 2017, compared to the same period in 2016, according to new data from …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103744/GDPR-400x200.jpg)
Navigating GDPR in the mobile enterprise
Securing data and protecting privacy in a connected world is already a major challenge for any enterprise, and mobility only magnifies this challenge. Mobile devices are …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110326/puzzle-400x200.jpg)
How large businesses approach cybersecurity today
Over 90% of large US companies with 500+ employees have a cybersecurity policy in place to protect them from both real and anticipated threats. Clutch surveyed over 300 …
![work](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103241/work-400x200.jpg)
BH Consulting launches scholarship programme to address infosec skills gap
BH Consulting, an information security specialist company, has launched a Masters Scholarship programme to encourage talented people to enter the cybersecurity market. Under …
![world intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104029/bae-systems-intelligence-400x200.jpg)
Week in review: Cyber threat hunting, Android DDoS botnet, drone bug bounty
Here’s an overview of some of last week’s most interesting news, podcasts and articles: New, custom ransomware delivered to orgs via extremely targeted emails …
![clock](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103250/clock-400x200.jpg)
The real cost of alarm fatigue
One of the toughest challenges for an IT security team is managing and sifting through the deluge of security alerts that are created on a daily basis. Teams can waste …
![consumer](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105245/consumer-400x200.jpg)
What’s the use of a privacy policy?
In 2012 it was reported that “16% of Internet users claim to always read privacy policies of the sites and online services with which they share their private …
![cloud computing](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103311/cloud_computing-400x200.jpg)
The security status quo falls short with born-in-the-cloud software
Born-in-the-cloud software, pioneered by companies like Salesforce, are beginning to dominate the computing landscape. According to Gartner, by 2020, the cloud shift will …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage