Help Net Security
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
How to implement an EFSS ransomware recovery plan
Ransomware attacks are at an all-time high, and security experts warn it has become a matter of “when” not “if” your company will be breached. The number of victims has grown …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110241/cloud-400x200.jpg)
Alarming cloud encryption misconceptions revealed
Businesses have a high level of concern about the exposure of sensitive and regulated data in the cloud to security threats. Yet despite this, the majority of data owners …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110235/building-400x200.jpg)
Worldwide security technology revenue to surpass $100 billion in 2020
Worldwide revenues for security-related hardware, software, and services will grow from $73.7 billion in 2016 to $101.6 billion in 2020. This represents a compound annual …
![traffic](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110232/traffic-400x200.jpg)
1 in 5 executives take risks with sensitive data to meet regulatory demands
The Anti-Money Laundering Directive (AML), the EU-US Privacy Shield and the Market Abuse Directive (MAD) and Regulation (MAR) are the three biggest regulatory pressures across …
![Linksys WRT3200ACM](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110230/Linksys-WRT3200ACM-400x200.jpg)
New Linksys WRT3200ACM open source Wi-Fi router is optimization ready
Linksys announced the next generation of its one and only WRT router – the WRT3200ACM. It features Tri-Stream 160 technology creating the fastest Dual Band router …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112023/face-400x200.jpg)
How identity and access management is critical in the digital transformation process
Digital transformation is a top priority and source of anxiety for enterprises, but the majority of IT decision makers have not completed technology deployments to address the …
![Berlin](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111122/berlin-400x200.jpg)
Global cyber security leaders to gather in Berlin
A series of reports over the summer have shown not only that cybercrime is more persistent than ever, but there are also more opportunities. The growth of technology, …
![Ubuntu](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113028/ubuntu-400x200.jpg)
Ubuntu 16.10 released with hybrid cloud operations and Unity 8 developer preview
Released today, Ubuntu 16.10 comes with hybrid cloud operations, bare-metal cloud performance, the ability to lift-and-shift 80% of Linux VMs to machine containers, Kubernetes …
![Laptop](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110246/laptop-400x200.jpg)
Securing workspaces in a hyperconnected digital era
Enterprises that fail to offer employees a flexible, autonomous, and creative work environment are at risk of not attracting and retaining next-generation talent, according to …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110910/biohazard-400x200.jpg)
Most businesses don’t inspect cloud services for malware
The growing use of cloud services and the lack of visibility into sensitive information in the cloud can result in more damaging or costly data breaches, according to the …
![burn](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110748/burn-400x200.jpg)
SSHowDowN Proxy attacks using IoT devices
Akamai’s Threat Research team has identified a recent spate of SSHowDowN Proxy attacks whereby attackers are using Internet of Things (IoT) devices to remotely generate …
![patching cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113841/patchingcloud-400x200.jpg)
Shadow IT intensifies cloud security risks
Lack of visibility into an organization’s use of cloud providers can lead to unauthorized access to data, improper handling and storage of data and improper data removal. As a …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage