![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104226/gdpr-2-400x200.jpg)
Want to avoid GDPR fines? Adjust your IT procurement methods
Gartner said many organizations are still not compliant with GDPR legislation even though it has been in force since May 2018. This is because they have not properly audited …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104753/iot-1-400x200.jpg)
IoT security spend to reach $6 billion by 2023
A new study from Juniper Research found that spending on IoT cybersecurity solutions is set to reach over $6 billion globally by 2023. It highlighted rapid growth, with …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113133/bomb-400x200.jpg)
42% of organizations globally hit by cryptomining attacks
Cybercriminals are aggressively targeting organizations using cryptomining malware to develop illegal revenue streams, according to Check Point. Meanwhile, cloud …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110235/building-400x200.jpg)
Threats financial organizations will face in 2019
What type of threats will financial services and banking organizations face in 2019? According to IntSights Cyber Intelligence, they should be prepared for breaches effected …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100701/chess-400x200.jpeg)
Infosec and the future: Dr. Giovanni Vigna on lessons learned over 25 years
When I asked Dr. Giovanni Vigna what are some of the most important lessons he has learned during the 25+ years he spent working in computer security, his answer was simple: …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
Cost of data breaches rises, mega breaches cost up to $350 million
Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage. For example, …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
Hacker-powered security is reaching critical mass
HackerOne announced findings from the 2018 Hacker-Powered Security Report, based on over 72,000 resolved security vulnerabilities, 1,000 customer programs and more than $31 …
![fingerprint](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112928/fingerprint-400x200.jpg)
How the access control market has developed and should direct itself in the coming years
Smart cards have become synonymous with the access control market, continuing to be used across a variety of end markets including, healthcare, warehousing and storage, …
![talk](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100600/talk-400x200.jpeg)
Do advances in voice technology pose a threat to enterprise security?
A new study from Aeriandi has highlighted UK organisations’ contradictory attitudes towards the voice channel, increasing the chances of their customers’, employees’ and …
![airport](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100553/airport-400x200.jpeg)
Access to airport’s security system sold on dark web
Leveraging compromised RDP credentials is one of the easiest ways attackers can break into company networks and systems. Unfortunately for all of us, there are a lot of …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101153/patch-400x200.jpg)
Microsoft plugs 53 security holes in July 2018 Patch Tuesday
For its July 2018 Patch Tuesday, Microsoft has patched 53 vulnerabilities. 17 of them are critical and 16 of those affect Internet Explorer and Edge. Microsoft updates …
![handshake](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100637/handshake-400x200.jpeg)
Not enough CISOs and business leaders cooperate on a cybersecurity plan and budget
With the proliferation of more and more sensitive data, expanding connectivity, and the adoption of automated processes, new research from Accenture reveals that C-suite and …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage