Help Net Security
![speed](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110532/speed-400x200.jpg)
Organizations sacrificing security for the speed of business
Organizations know how to improve security. However, due to pressures caused by the rate of business change, including the adoption of new technologies and applications, …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112812/danger-400x200.jpg)
Surge in polymorphic attacks and malicious Android apps
Users are over 20 percent less likely to encounter malware and other undesirable executable files than in 2015. The data, collected by Webroot, shows that, although the number …
![Bluetooth](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110529/bluetooth-400x200.jpg)
Fresh Bluetooth Developer Toolkit line tackles IoT security, interoperability
The Bluetooth Special Interest Group (SIG) released several updates to its developer toolkit line-up, which enables developers to build smarter when creating things like …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
US gets federal guidelines for safe deployment of self-driving cars
The Obama Administration has issued a new Federal Automated Vehicles Policy to help facilitate the responsible introduction of self-driving cars. The policy sets a proactive …
![Trust](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110557/trust-distrust-400x200.jpg)
Should you trust your security software?
The complaint that security is broken isn’t new and even industry insiders are joining the chorus. Companies spent an estimated $75 billion last year on security products and …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111627/cloud-1-400x200.jpg)
Cloud going mainstream, few are maximizing value
While cloud adoption continues to accelerate, few organizations are maximizing the value that cloud can offer, according to IDC. The increased cloud adoption is being fueled …
![terrorist](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112850/terrorist-400x200.jpg)
Cyber terrorism seen as biggest single future threat
47% of UK IT decision makers (ITDMs) are more worried about cyber terrorism attacks now than they were 12 months ago, according to IP EXPO Europe. This was identified as the …
![Apple macOS Sierra](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110545/macos-sierra-400x200.jpg)
macOS Sierra released, introduces auto unlock with Apple Watch
Apple released macOS Sierra, now available as a free update. The new OS brings Siri to the Mac, along with all-new capabilities designed specifically for use on the desktop. …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195157/user-400x200.jpg)
Identity and personal data theft account for 64% of all data breaches
Data breaches increased 15% in the first six months of 2016 compared to the last six months of 2015, according to Gemalto. Worldwide, there were 974 reported data breaches and …
![energy](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113228/energy-400x200.jpg)
Energy sector IT pros overconfident in data breach detection skills
A new study by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
Ransomware families and volume of attacks continue to rise
Both the number of variants of ransomware and volume of malware attacks were on the rise in August, according to Check Point. During August, the number of active ransomware …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112759/risk-400x200.jpg)
IT asset managers must be proactive with up-front risk mitigation strategies
Recent Iron Mountain research reveals the risks associated with licensing critical software applications, and why procurement professionals and IT asset managers must take …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage