Help Net Security
![Infosecurity Europe 2017 Expo](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104124/IMG_3737-400x200.jpg)
Photo gallery: Infosecurity Europe 2017 Expo
Infosecurity Europe 2017 is underway at Olympia London in London. Here are a few photos from the expo floor. Featured companies: Qualys, Splunk, InfoArmor, Centrify, iStorage, …
![Flashpoint dark web](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194258/flashpoint-darkweb-400x200.jpg)
Dark web fraud guides reveal potential threats to orgs
An in-depth look at content from more than 1,000 fraud guides available for sale on the dark web revealed that the majority of these guides are useless. Still, as many as 20 …
![vacation mobile wi-fi wireless secure](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104128/vacation-mobile-400x200.jpg)
How to stay secure while staying connected on vacation
The wide availability of Wi-Fi networks can make it difficult to unplug and disconnect on vacation, but if consumers take that extra step and unplug they can experience a more …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105801/lock-400x200.jpg)
Most organizations believe their mainframe is more secure than other systems
While 78 percent of CIOs say their mainframe is more secure than other systems, 84 percent say they are still exposed to a significant risk of insider threats due to …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104856/connection-400x200.jpg)
High-Tech Bridge reinforces ImmuniWeb with IAST technology
Today at Infosecurity Europe 2017, High-Tech Bridge, a provider of web and mobile application security testing services and a Gartner Cool Vendor 2017, announced availability …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113044/vault-1-400x200.jpg)
Whitepaper: Confronting advanced threats as an organization
This whitepaper is no longer available. Global cybersecurity issues have gone mainstream, but email security has curiously slipped by the wayside despite the fact that 91% of …
![road sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111958/road_sign-400x200.jpg)
Application security trends: What you need to know
Today at Infosecurity Europe 2017, High-Tech Bridge released a summary report on application security trends for Q1 – Q2 2017. Statistical data mentioned in the report largely …
![ImmuniWeb](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104130/immuniweb-portal-denyall-firewall-400x200.png)
High-Tech Bridge and DenyAll partner to defend web applications and services
High-Tech Bridge, recently named Gartner Cool Vendor 2017, and DenyAll, a Rohde & Schwarz Cybersecurity company, joined the efforts to combat cybercrime and defend …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111237/qualys-400x200.jpg)
Qualys enables customers to efficiently comply with key GDPR elements
Qualys now offers customers purpose-built content, workflows and reporting in its cloud platform to provide them with continuous IT asset visibility, data collection and risk …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105254/ddos_attacks-400x200.jpg)
Stealthy DDoS attacks distract from more destructive security threats
The greatest DDoS risk for organisations is the barrage of short, low volume attacks which mask more serious network intrusions. Despite several headline-dominating, …
![iStorage drives](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104146/istorage-drives-400x200.jpg)
iStorage introduces ultra-secure hard drives
iStorage launched of their new range of USB 3.1 HDDs and SSDs, consisting of the diskAshur, diskAshur SSD, diskAshur PRO, diskAshur PRO SSD and the diskAshur DT – all of …
![CoSoSys Endpoint Protector](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104149/CoSoSys-EP-400x200.jpg)
Endpoint Protector 5: Responsive interface and updated eDiscovery module
CoSoSys released Endpoint Protector 5 with updates on the management console which has been redesigned for a modern, user-friendly and responsive experience. “Endpoint …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage