![EU](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100613/EU-lock2-400x200.jpg)
GDPR implementation lessons can help with CCPA compliance
The ever increasing number of data breaches has made consumers more aware of how their data is being used and has emphasized the importance of keeping personal data private, …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103351/businessman-400x200.jpg)
CISO do’s and don’ts for board reporting
Security is no longer just a job for IT – it impacts all areas of a business, from brand perception to the bottom line. As a result, CISOs are increasingly being asked to …
![healthcare professionals](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102209/healthcare-professionals-400x200.jpg)
Healthcare executives need to make cybersecurity a business priority
Risks associated with Internet of Things, medical devices, third-party vendors, and program management are top of mind for healthcare executives, according to a CynergisTek’s …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094355/encryption-400x200.jpg)
Code signing keys and certificates are crucial security assets, are you protecting them?
Only 28 percent of organizations consistently enforce a defined security process for code signing certificates, a Venafi study of over 320 security professionals in the U.S., …
![globe](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095836/globe-400x200.jpg)
Personal security and national security concerns are back on the rise
More than one in five (22%) Americans say they have cancelled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks …
![connected house](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104916/connected-house-400x200.jpg)
Smart home security devices most at risk in IoT-targeted cyber attacks
Smart home security cameras equate to 47% of the most vulnerable devices followed by smart hubs such as Googlehome, Amazon Alexa, with the top countries executing attacks …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104924/building-400x200.jpg)
Whitepaper: Maturing a Threat Intelligence Program
Whether you are getting started with TI or seeking to expand an existing program, the Threat Intelligence Maturity Model provides a systematic guide to help you understand …
![Cynet platform](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095647/cynet-platform-400x200.jpg)
The Cynet Free Visibility experience: Unmatched insight into IT assets and activities
Real-time visibility into IT assets and activities introduces speed and efficiency to many critical productivity and security tasks organizations are struggling with, from …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105737/danger-400x200.jpg)
Researchers devise RAMBleed attack to grab secret data from memory
Researchers have demonstrated a new variation of the Rowhammer attack: dubbed RAMBleed, it may allow attackers to read data stored inside the computer’s physical memory. …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100243/patch-400x200.jpg)
June 2019 Patch Tuesday: A little something for everybody
For June 2019 Patch Tuesday, Microsoft has fixed a whooping 88 CVE-numbered vulnerabilities, Adobe has plugged many critical security holes in ColdFusion and Flash Player, and …
![US Army](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094136/us_army2-400x200.jpg)
First framework to score the agility of cyber attackers and defenders
To help train government and industry organizations on how to prevent cyberattacks, as part of a research project for the U.S. Army, scientists at The University of Texas at …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
Will self-driving cars represent a new mode for surveillance?
Picture the future, where driving is a thing of the past. You can hop in your car or one from a ride-share, buckle up and tell the car where you want to go. During your ride, …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes