![ignore](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101125/ignore-400x200.jpg)
Too many IT pros ignore critical security issues
A recent Outpost24 survey of 155 IT professionals, which revealed that 42 percent ignore critical security issues when they don’t know how to fix them (16 percent) or don’t …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103744/GDPR-400x200.jpg)
Most financial firms still unprepared for GDPR
With only a few weeks until implementation, more than 50% of investment firms globally are unlikely to be ready for the General Data Protection Regulation (GDPR) on 25 May …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101936/spotlight-400x200.jpeg)
Half of all companies do not have adequate application security visibility
The Ponemon Institute surveyed nearly 1,400 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected …
![Capsule8](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101131/capsule8-400x200.jpg)
How to adopt the mindset of continuous security for security operations
In this podcast recorded at RSA Conference 2018, Dino Dai Zovi, co-founder and CTO at Capsule8, talks about what continuous security is, and how you should bring more of this …
![Arrows](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112857/choose-400x200.jpg)
Breach activity declines, number of compromised records remains high
After year over year increases in the number of reported data breaches, Risk Based Security has released the results of their Q1 2018 Data Breach QuickView Report, showing the …
![Epson AR glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101134/epson-glasses-1-400x200.jpg)
First biometric authentication solution for consumer augmented reality headsets
Redrock Biometrics and Epson have partnered to bring PalmID to the MOVERIO Smart Glasses Platform as the first biometric authentication solution for a consumer AR headset. …
![Telegram](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103838/telegram-400x200.jpg)
Cybercriminals are turning to Telegram due to its security capabilities
Check Point researchers have revealed that cybercriminals are increasingly exploiting the popular messaging app, Telegram, to exchange information, recruit new partners and …
![iOS biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104642/ios-biohazard-400x200.jpg)
iOS users are 18x more likely to be phished than to download malware
Phishing is the number one mobile threat affecting organizations. The Wandera’s Phishing Report 2018 shows that iOS users are 18x more likely to be phished than to …
![handshake](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101343/handshake-400x200.jpeg)
Why collaboration can be a killer app for defense
In this podcast recorded at RSA Conference 2018, Travis Farral, Director of Security Strategy at Anomali, talks about the impact of blue team collaboration. Discover why …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101138/gdpr-400x200.jpg)
GDPR Rails: Community GDPR compliance tool
Prey Software announced GDPR Rails, an open source tool set designed to help small to mid-sized businesses comply with the General Data Protection Regulation (GDPR). GDPR …
![SAP](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101224/sap2-400x200.jpg)
SAP systems: The threat of insecure configurations
Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a …
![Android explode](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103322/android-explode-400x200.jpg)
New Rowhammer attack can be used to hack Android devices remotely
Researchers from Vrije Universiteit in Amsterdam have demonstrated that it is possible to use a Rowhammer attack to remotely hack Android phones. What is a Rowhammer attack? …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)