![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105558/facebook-400x200.jpg)
Facebook announces “Clear History” privacy tool
Facebook has announced new products and redesigns of old ones during its annual F8 developer conference, as well as changes meant to reassure users that the company is doing …
![traffic](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110652/traffic-400x200.jpg)
Do public clouds make it more difficult to get visibility into data traffic?
The second annual Ixia 2018 Security Report analyzes how enterprise network attack surfaces are increasing as the perimeter of the traditional network expands into the cloud. …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101209/bot-400x200.jpg)
Public breaches drive increase in account takeover attempts
Distil Networks released The 2018 Anatomy of Account Takeover Attacks Report, based on data from 600 domains that include login pages. The study revealed that all monitored …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102647/gdpr-2-400x200.jpg)
Time is running out, yet many US companies are not GDPR-ready
A significant percentage of US companies are uncertain about or unprepared for the European Union’s General Data Protection Regulation (GDPR) that takes effect later this …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105427/abstract-400x200.jpg)
CEO priorities are shifting to embrace digital business
Growth tops the list of CEO business priorities in 2018 and 2019, according to a recent survey of CEOs and senior executives by Gartner. However, the survey found that as …
![Twitter](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104729/twitter-round-400x200.jpg)
Twitter sold data access to Cambridge Analytica-affiliated researcher
Dr Aleksandr Kogan, the academic behind the personality quiz app that harvested Facebook information of 80+ million people, has also had access to a random sample of public …
![UK](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101702/uk-400x200.jpg)
UK High Court rules part of Snoopers’ Charter incompatible with EU law
The UK High Court has ruled that part of the Investigatory Powers Act 2016 (nicknamed Snoopers’ Charter) is incompatible with European Union law and the European …
![world danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101905/world-danger-400x200.jpg)
Strengthening information security to protect against fake news
Online disinformation, also refered to as “fake news”, has recently received a lot of attention as a potential disruptor of democratic processes globally. There is a need to …
![ThreatQ Investigations](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101351/ThreatQ-Investigations-400x200.png)
Bring order to the chaos of incident response and threat investigations
In this podcast recorded at RSA Conference 2018, Leon Ward, VP of Product Management at ThreatQuotient, talks about bringing order to the chaos of security operations, as well …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102230/wifi-400x200.jpg)
Wi-Fi honeypots: Alive and well at RSAC 2018
It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
Should governments regulate social media data collection?
Venafi announced the results of a survey querying 512 security professionals attending RSA Conference 2018. The survey evaluated opinions on the intersection of cyber …
![Fortanix](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101216/fortanix-1-400x200.jpg)
Fortanix Runtime Encryption: Protect sensitive applications and data in use
Encryption is an effective data protection control, however it’s use is currently limited to data at rest and data in motion. When, an application starts to run, it’s data in …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)