Help Net Security
Only a third of sensitive data stored in cloud-based applications is encrypted
Despite the continued importance of cloud computing resources to organisations, companies are not adopting appropriate governance and security measures to protect sensitive …
Is your business still HIPAA compliant after the 2016 federal changes?
The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) warned healthcare professionals and their business associates of its intention to launch …
Law enforcement and IT security companies join forces to fight ransomware
Today, the Dutch National Police, Europol, Intel Security and Kaspersky Lab launched the No More Ransom initiative, a new step in the cooperation between law enforcement and …
As voice interaction increases, what will security look like in the next 5 years?
Things are getting chatty – everywhere. In Mary Meeker’s recent annual report on the State of the Internet, she dedicated a chunk of it to the liftoff of the voice interface. …
Industry collaborates on automotive cybersecurity best practices
New technology has paved the way for extraordinary advancements in vehicle safety, emissions reduction, and fuel economy. Today’s vehicles do more to keep drivers secure …
Week in review: Pokémon GO, flawed code hooking engines, Ubuntu Forums hacked again
Here’s an overview of some of last week’s most interesting news and articles: Preparing for new EU cybersecurity rules and regulations The Network and Information …
Wi-Fi hack experiment conducted at Republican National Convention site
Avast security researchers conducted a Wi-Fi hack experiment at various locations around the Republican National Convention site in Cleveland to demonstrate how risky it can …
How to secure critical utilities
Over the past few years the issue of cybersecurity and the threat of hackers stealing data has increased tenfold. Not a day goes by without a breach being reported of a …
Cloud shift will affect $1 trillion in IT spending
More than $1 trillion in IT spending will be directly or indirectly affected by the shift to cloud during the next five years, said Gartner, Inc. This will make cloud …
Companies are unprepared to protect key assets
Knowledge assets are confidential information critical to a company’s core business – other than personal information that would trigger notice requirements under …
Andrus Ansip to keynote Borderless Cyber Europe
Today’s digital threats are more numerous and sophisticated than ever. As a result, many in the security industry feel organizations can no longer adequately defend …
Alleged Kickass Torrents owner arrested, site taken down
Artem Vaulin, a 30-year-old Ukrainian that is believed to be the creator and owner of Kickass Torrents, currently the most popular and most visited illegal file-sharing …
Featured news
Resources
Don't miss
- Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready
- Review: The Psychology of Information Security
- 29 million leaked secrets in 2025: Why AI agents credentials are out of control
- Hackers hijacked CPUID downloads, served STX RAT to victims
- Adobe issues emergency fix for Acrobat Reader flaw exploited in the wild (CVE-2026-34621)