Help Net Security
![box](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111858/box-400x200.jpg)
Rethink network security outside the box
Preventing bad guys from compromising an organization has historically been executed based on a basic concept: establish a perimeter, and control who and what goes in and out. …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113858/abstract-400x200.jpg)
Hyperconverged infrastructure adoption is accelerating
The hyperconverged infrastructure is increasingly being adopted by enterprise and midmarket companies to reduce data center costs and improve operational efficiency, according …
![traffic](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113033/traffic-400x200.jpg)
Week in review: Smart TV ransomware, DNC hack, and DAO under attack
Here’s an overview of some of last week’s most interesting news and articles: Ransomware targets Android smart TVs If you own a Sharp and Philips smart TV running …
![caution](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111905/caution-400x200.jpg)
50% of ads on free livestreaming websites are malicious
Millions of people use free livestreaming websites to watch sports and other live events online, but this comes with a considerable security risk. Researchers from KU …
![threat hunting](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113059/threat-hunting-400x200.jpg)
How do you win the web security game when the rules keep changing?
Successfully protecting against web-based attacks is like trying to win a game that keeps changing its rules, only nobody tells you what the new rules are. With a rapidly …
![building blocks](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111907/building_blocks-400x200.jpg)
Top 10 technologies for information security and their implications
Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2016. “Information security teams and …
![airplane](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111910/airplane-400x200.jpg)
Get ready for a surge in online travel fraud
Unsurprisingly, transactions for booking flights, hotels and rental cars increase significantly over the summer months. In addition, fraudulent activity against online travel …
![CLTRe](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111913/cltre-toolkit-400x200.jpg)
Assess, build and improve security culture with CLTRe
Norwegian security startup CLTRe announced a new product series, enhancing its existing Saas offering, the Security Culture Toolkit. This new range consists of CLTRe Control, …
![vote](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111919/vote-400x200.jpg)
Security implications of online voting
With essentially everything moving online, it would seem to be the natural progression that voting online or on your mobile device would be the next thing to happen. Not only …
![dollar](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112427/dollar-400x200.jpg)
The average cost of a data breach is now $4 million
The average data breach cost has grown to $4 million, representing a 29 percent increase since 2013, according to the Ponemon Institute. Cybersecurity incidents continue to …
![Abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111925/abstract-hole-400x200.jpg)
75% of organizations have serious cybersecurity risk exposure
Organizations that invest in detection and response technologies, rather than perimeter-based solutions, are better poised to defend against cyber incidents. The second annual …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113312/iot-400x200.jpg)
Can you see and control IoT devices on your network?
While the majority of IT pros acknowledge the growing number of IoT devices on their networks, they are unaware of how to properly secure them, according to ForeScout. The …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage