Help Net Security
![Microsoft Windows](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110301/microsoft_windows-400x200.jpg)
October Patch Tuesday: Changes, urgent updates and what’s coming next
The leaves aren’t the only things changing this October. Patch Tuesday is here and with it comes some interesting updates from big names in the software space. This month, …
![transformation](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110303/transformation-400x200.jpg)
Identity-centric security: The killer app for digital transformation
Organizations are measuring the success of IT security beyond just breaches and compliance; they now are including business performance indicators that contribute directly to …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110310/gdpr-400x200.jpg)
97 percent of companies don’t have a GDPR plan
Organizations ‒ both SMBs and large enterprises ‒ lack general awareness of the requirements of the new regulation, how to prepare for it, and the impact of non-compliance on …
![mechanics](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110321/mechanics-400x200.jpg)
Deception mechanisms for detecting sophisticated attacks
Private information stored in document files is the most popular target for attacks coming from professional hackers, according to TopSpin Security. File traps, including …
![Dell SonicWALL Email Security](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110306/sonicwall-email-security-appliances-400x200.jpg)
Four vulnerabilities found in Dell SonicWALL Email Security virtual appliance application
Digital Defense (DDI) disclosed the discovery of four security vulnerabilities found in the Dell SonicWALL Email Security virtual appliance application. The appliance is …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110326/puzzle-400x200.jpg)
Components of an effective vulnerability management process
Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data …
![team](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111650/team-400x200.jpg)
Does your organization have an endpoint security strategy?
Only thirty-three percent of IT security professionals have security strategies in place to protect the growing number of endpoints on their networks, according to a recent …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113326/vault-400x200.jpg)
Cloud and IoT adoption requires organizations to future-proof PKI implementations
New research by the Ponemon Institute shows an increased reliance on PKIs in today’s enterprise environment, driven by the growing use of cloud-based services and …
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195637/twitter-verizon2-400x200.jpg)
SOC 2 + HITRUST: Evolving infosec demands in healthcare
Two-thirds of business associates are not fully prepared to meet the growing marketplace demands regarding controls for protecting healthcare information, such as patient …
![earth](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111449/earthspace-400x200.jpg)
The impact of intelligent systems on IT teams
Fast track deployment of intelligent systems is well underway, according to Ipswitch. 88% of IT professionals saying their organisation has already invested in one or more …
![Google Station](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110335/google-station-400x200.jpg)
Google wants to revamp public Wi-Fi networks, but what about security?
William Shakespeare once wrote, “the eyes are the windows to your soul,” but if you ask savvy retailers, they might say it’s guest Wi-Fi. Why? New Wi-Fi systems allow them to …
![Internet of Things](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110332/iot-400x200.jpg)
Steps to developing secure IoT products
IoT is broad ranging, and the pace of change and innovation is fast. This makes identifying controls that can be applied against diverse IoT products difficult. Recently, much …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage