Help Net Security
![Bluetooth mesh](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103618/bluetooth-mesh-400x200.jpg)
Bluetooth now supports mesh networking, ideally suited for building automation
The Bluetooth Special Interest Group (SIG) announced today that Bluetooth technology now supports mesh networking. The new mesh capability enables many-to-many (m:m) device …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110509/usa-flag-1-400x200.jpg)
US data breaches surge, businesses and healthcare organizations hit hardest
The number of US data breaches tracked through June 30, 2017 hit a half-year record high of 791, according to recent numbers released by the Identity Theft Resource Center …
![DEF CON 25](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103627/defcon-25-400x200.jpg)
Decrypting DEF CON badge challenges
Every summer, tens of thousands of hackers and information security enthusiasts make a journey to the Last Vegas strip for the Black Hat and DEF CON security conferences. …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105434/idea-400x200.jpg)
AI technologies will be in almost every new software product by 2020
Market hype and growing interest in artificial intelligence (AI) are pushing established software vendors to introduce AI into their product strategy, creating considerable …
![Full Stack Web Performance](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103630/full_stack_web_performance-400x200.png)
eBook: Full Stack Web Performance
Full Stack Web Performance is written for anyone grappling with the challenges of performance in a DevOps environment. Whether you’re a web developer, a DevOps engineer, an …
![London](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195027/london-400x200.jpg)
A UK business will spend more than £1m recovering from a data breach
A UK business would have to spend £1.1m on average to recover from a breach – more than the global average of £1m. An NTT Security study of 1,350 non-IT business decision …
![run](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103637/run-400x200.jpg)
Launch your own cybersecurity sprint: 30 days to improved security
Whether it’s well-publicized cyber attacks on government organizations or widespread ransomware that threatens to halt business operations, attackers continue to target …
![IBM Z](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103639/IBMZ-400x200.jpg)
IBM reboots iconic mainframe: Encrypt data all the time, at any scale
IBM today unveiled IBM Z, the next generation of a transaction system capable of running more than 12 billion encrypted transactions per day. The new system also introduces an …
![abstract, generic](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110119/abstract5-400x200.jpg)
Week in review: Acunetix 11 review, BEC scams exposed, innovation and cybercrime
Here’s an overview of some of last week’s most interesting news and articles: 751 domains hijacked to redirect visitors to exploit kit An unknown attacker has …
![NTT Security](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103644/ntt_security-400x200.jpg)
NTT Security to give away Gap Assessment at Black Hat USA 2017
This year at Black Hat USA 2017, NTT Security is focusing on incident response readiness with a promotion called Swimming with the Sharks: The Need for Proactive Critical …
![Binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195635/binary-sun-400x200.jpg)
Could e-discovery pros fill the insatiable demand for cybersecurity talent?
When looking at the cybersecurity industry from a jobs perspective, there is no denying demand for talent far exceeds supply. With many lingering vacant job requisitions, who …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114016/money-coins-400x200.jpg)
Worldwide IT spending to grow 2.4 percent in 2017
Worldwide IT spending is projected to total $3.5 trillion in 2017, a 2.4 percent increase from 2016, according to Gartner. This growth rate is up from the previous …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage