Help Net Security
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112956/eye-400x200.jpg)
Most organizations still lack visibility into database assets
Only 19 percent of organizations have what the organization considers to be “excellent” visibility into their data and database assets, according to Osterman …
![Desk](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112959/desk_type-400x200.jpg)
Compromised credentials still to blame for many data breaches
Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …
![general virtual digital](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113219/general-virtual-400x200.jpg)
Week in review: Opera’s VPN is just a proxy, GDPR compliance, hacking traffic sensors
Here’s an overview of some of last week’s most interesting news and articles: Hacking Team hacker explains how he did it In a Pastebin post, he shared that he …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113005/anonymous-400x200.jpg)
Identity protection: The critical intersection of biometrics and commerce
In light of some high-profile data breaches in recent years, businesses are constantly seeking possible forms of authentication to replace passwords. While such breaches might …
![payment card](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113353/payment-card-400x200.jpg)
Increase in credit card leaks with high profile apps and sites
A new report reveals a continued rise in apps and mobile websites leaking credit card data, with several new cases from prominent brands, including the Hong Kong metro system. …
![red wall](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113011/red_wall-400x200.jpg)
IT channel security practices will balance products, processes and skills
A comprehensive security offering is quickly moving from simple product installation to an ongoing process. IT channel companies that highlight processes and education along …
![Anomali](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114018/anomali-400x200.jpg)
Anomali lands $30 million in series C funding
Anomali, the provider of ThreatStream threat intelligence and Anomali Enterprise platforms, has raised $30 million in series C funding. The round, led by Institutional Venture …
![Opera VPN](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113021/opera-vpn-400x200.jpg)
Opera browser now comes with free built-in VPN
Opera added a free VPN client with unlimited data usage in its newest developer version. All other VPNs for the major desktop browsers are extensions, with most of them based …
![rings](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113023/rings-400x200.jpg)
Exploit kits: The rise in user-friendly malware
In past years, we’re seen a massive increase in the use of exploit kits. No website is too great to withstand the many powerful kits, with the Mail Online famously …
![Solutionary report](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113025/solutionary-report-400x200.jpg)
A global data analysis of hostile activity
Solutionary’s latest Global Threat Intelligence Report contains information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion …
![Ubuntu](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113028/ubuntu-400x200.jpg)
Ubuntu 16.04 LTS introduces “snaps” for new robust, secure app format
Canonical released Ubuntu 16.04 LTS, featuring the new “snap” package format and LXD pure-container hypervisor. An Ubuntu Long Term Support (LTS) release is …
![pyramid](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113038/pyramid-400x200.jpg)
Why a layered defense is your best protection against malware
As long as there is software there will be vulnerabilities and those vulnerabilities will be exploited. It’s a bold statement, and oddly enough technically incorrect. In …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage