Help Net Security
![(IN)SECURE Magazine 50](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111810/magazine50-400x200.jpg)
(IN)SECURE Magazine issue 50 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 50 has been released today. Table of contents …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112041/cloud-400x200.jpg)
Cloud-first is replacing the defensive no-cloud stance
By 2020, a corporate “no-cloud” policy will be as rare as a “no-Internet” policy is today, according to Gartner. Cloud-first, and even cloud-only, is …
![Drone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194549/done-phantom-400x200.jpg)
FAA finalizes operational rules for drones
The Department of Transportation’s Federal Aviation Administration has finalized the first operational rules for routine commercial use of small unmanned aircraft systems (UAS …
![cloud computing](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113632/cloud_computing-400x200.png)
Where does your cloud data live? 3 questions to ask
There’s a common thread behind every security pro’s cloud-related fears: control. Whether your company’s infrastructure revolves around a cloud-centric strategy or regulates …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Most businesses would not pay in the event of a ransomware attack
Business owners in the U.S. recognize the severity of ransomware and the potential disruption to business operations, yet 84 percent say they would not pay in the event of a …
![Rule 41](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111820/rule41-eff-400x200.jpg)
Changes to Rule 41 will increase law enforcement hacking, surveillance
The Electronic Frontier Foundation (EFF), the Tor Project, and dozens of other organizations are calling on citizens and website operators to take action to block a new rule …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113503/building-400x200.jpg)
Supporting the IT edge is expensive, full of potential security risks
Organizations are facing multiple challenges when managing the IT edge – at remote and branch offices. A Riverbed survey asked IT professionals about the various challenges …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112826/biohazard-400x200.jpg)
Malware families attacking business networks continue to grow
The number of active global malware families increased by 15 percent in May 2016, according to Check Point. They detected 2,300 unique and active malware families attacking …
![Binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195635/binary-sun-400x200.jpg)
The hunting approach to defeating cyber attacks
Security used to be all about building walls around our organizations and trying to immediately stop all attacks. But today’s adversaries are sophisticated, persistent, and …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194215/healthcare-400x200.jpg)
Healthcare needs a data centric security approach
With increasing attacks on PHI data, coupled with more stringent data security requirements and regular audits, organizations should act now – before it’s too late. A recent …
![Red Hat](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111840/redhat-1-400x200.jpg)
Red Hat launches Ansible-native container workflow project
Red Hat launched Ansible Container under the Ansible project, which provides a simple, powerful, and agentless open source IT automation framework. Available now as a …
![CEO](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112240/ceo-400x200.jpg)
How to assess your stakeholder matrix as part of a cloud security strategy
Running your organization in the cloud has many benefits: cost savings, efficiency gains, and the flexibility to scale, to name a few, along with some security drawbacks. This …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage