![battery](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112445/battery-400x200.jpg)
Most organizations can’t protect digital information in the long-term
New research has revealed that the majority of organizations do not have a coherent long-term strategy for their vital digital information even though virtually all of them …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112829/money-laptop-400x200.jpg)
Security startup confessions: Limited funds and their impact on security
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112510/hole-400x200.jpg)
Bridging the security automation gap
Security management has gotten out of hand, according to our recent State of Automation in Security Report. 48% of survey respondents had an application outage as a result of …
![X](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112724/x-wood-400x200.jpg)
CryptXXX 2.0 foils decryption tool, locks PCs
CryptXXX ransomware, first spotted in mid-April, has reached version 2.0, and a new level of nastiness. It’s also on its way to become one of the top ransomware families …
![industry danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112730/industry-danger-400x200.jpg)
It’s time to get serious about ICS cybersecurity
As recently reported by The Register, a proof-of-concept PLC worm could spell disaster for the critical infrastructure by making attacks exponentially more difficult to detect …
![Europe](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112305/Europe-flag-400x200.jpg)
GDPR challenges all organizations to mask EU data by default
Organizations need to re-architect operations and adopt a secure, data-first approach ahead of the introduction of the European General Data Protection Regulation (GDPR). The …
![DDoS Response Playbook](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112748/DDoS-Response-Playbook-400x200.jpg)
Playbook: Prepare your business for DDoS attacks
Like any business initiative, good preparation and planning can go a long way toward making the DDoS response process as manageable, painless, and inexpensive as possible. …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112759/risk-400x200.jpg)
How small businesses approach risk mitigation and response
CSID released the findings of a survey recently conducted for small businesses (under 10 employees) to determine sentiment and concerns from small business owners around cyber …
![Keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195431/keyboard-400x200.jpg)
Build security design principles into cyber-physical systems
We are immersed in a cyber-physical world. Information technology is deeply embedded in traditionally non-IT systems, including automobiles, the electric grid and emergency …
![Imperva Incapsula DDoS whitepaper](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113015/imperva-ddos-whitepaper-400x200.jpg)
Whitepaper: Protecting financial institutions from DDoS attacks
In response to the growing DDoS threat, the FFIEC issued a statement requiring banks and financial institutions to monitor their networks for DDoS attacks and proactively …
![zen](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112815/zen-400x200.jpg)
State of security: Human error and remembering the essentials
It seems that in a sea of complex digital ploys, companies are trying so hard to guard against the next big threat that they have forgotten the basics. From years of extensive …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195244/eye-400x200.jpg)
Hidden in plain sight: Four signs your network might be under attack
It’s a well-documented fact that an organization may be under attack and not even know it, with malware spreading undetected across the network for days, weeks or even …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?