Help Net Security
Only 20% of companies have fully completed their GDPR implementations
Key findings from a survey conducted by Dimensional Research highlight that only 20% of companies surveyed believe they are GDPR compliant, while 53% are in the implementation …
86% of enterprises have adopted a multi-cloud strategy
Based on a global survey of 727 cloud technology decision makers at businesses with more than 1,000 employees, Forrester Consulting found how shifting business priorities are …
Week in review: The OT/ICS landscape for cyber professionals, putting the Sec into DevSecOps
Here’s an overview of some of last week’s most interesting news: How to allocate budget for a well-rounded cybersecurity portfolio What should a well-rounded …
An overview of the OT/ICS landscape for cyber professionals
Most cyber security professionals take for granted the information technology or IT nature of their work. That is, when designing cyber protections for some target …
Want to avoid GDPR fines? Adjust your IT procurement methods
Gartner said many organizations are still not compliant with GDPR legislation even though it has been in force since May 2018. This is because they have not properly audited …
IoT security spend to reach $6 billion by 2023
A new study from Juniper Research found that spending on IoT cybersecurity solutions is set to reach over $6 billion globally by 2023. It highlighted rapid growth, with …
42% of organizations globally hit by cryptomining attacks
Cybercriminals are aggressively targeting organizations using cryptomining malware to develop illegal revenue streams, according to Check Point. Meanwhile, cloud …
Cost of data breaches rises, mega breaches cost up to $350 million
Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage. For example, …
Hacker-powered security is reaching critical mass
HackerOne announced findings from the 2018 Hacker-Powered Security Report, based on over 72,000 resolved security vulnerabilities, 1,000 customer programs and more than $31 …
How the access control market has developed and should direct itself in the coming years
Smart cards have become synonymous with the access control market, continuing to be used across a variety of end markets including, healthcare, warehousing and storage, …
Do advances in voice technology pose a threat to enterprise security?
A new study from Aeriandi has highlighted UK organisations’ contradictory attitudes towards the voice channel, increasing the chances of their customers’, employees’ and …
Innovation in healthcare: A hacker’s dream and CISO’s nightmare?
It’s hard not to be excited about artificial intelligence and machine learning in pure technology terms, but applying these innovations to the healthcare sector has the …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)