Help Net Security
![data security](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113102/data-security-400x200.png)
EU approves new data protection rules
Members of the European Parliament have given their final approval for the new General Data Protection Regulation (GDPR). Parliament’s vote ends more than four years of work …
![Globe](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113112/hand-globe-400x200.jpg)
3 steps to embracing NIST 800 security controls
One proven path to improving any organization’s security posture is to embrace the National Institute of Standards and Technology’s risk management framework set forth in its …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Trust is the key to cloud adoption
Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113738/question-400x200.jpg)
Why few US consumers penalize hacked companies?
About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of …
![stairs](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113117/stairs-400x200.jpg)
Why the smart office is highly susceptible to data breaches
The Edge in Amsterdam is one of the smartest office buildings in the world. The state-of-the-art offices include 28,000 connected sensors for motion, light, temperature, …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113120/gears-400x200.jpg)
Software tools and services used to achieve ISO 27001
With high profile breaches becoming almost a daily occurrence in the media, many organizations are now turning to the ISO 27001 information security standard to help them stay …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194457/idea-400x200.jpg)
Security tips and tricks for businesses and consumers
In 2015, the number of zero-day vulnerabilities discovered more than doubled to a record-breaking 54, a 125 percent increase from the year before, reaffirming the critical …
![abstract lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113419/abstract-lights-400x200.jpg)
Public institutions targeted with shape changing Qbot malware
A new strain of Qbot, malicious software that steals user credentials and creates backdoors on targeted devices, has infected over 54,000 PCs in thousands of organisations …
![servers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113122/servers-400x200.jpg)
Why ICS network attacks pose unique security challenges
Attacks on industrial control systems (ICSs) are increasing in frequency – and have become a reality we can no longer ignore. Securing these networks poses unique …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113133/bomb-400x200.jpg)
6,013 breaches reported in the US since 2005
In 2005, the Identity Theft Resource Center (ITRC) began monitoring and tallying the ever-growing number of US security breaches. Since then, the organization has seen a 397 …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113503/building-400x200.jpg)
Panama Papers: A data security disaster
The Panama Papers security breach is a juicy, made-for-the-Internet scandal. It has all the elements – secret off-shore accounts; involvement by international politicians, …
![Netwrix](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113136/netwrix-400x200.jpg)
Netwrix Auditor 8.0: Visibility into hybrid cloud IT infrastructures
Netwrix released Netwrix Auditor 8.0. The new version of the IT auditing platform simplifies detection of security threats and enables organizations to gain control over …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage