Help Net Security

Data breach reports delayed as organizations struggle to achieve GDPR compliance
Businesses routinely delayed data breach disclosure and failed to provide important details to the ICO in the year prior to the GDPR’s enactment. On average, businesses waited …

Moving from traditional on-premise solutions to cloud-based security
In this Help Net Security podcast recorded at RSA Conference 2019, Gary Marsden, Senior Director, Data Protection Services at Gemalto, talks about the feedback they’re …

Protecting applications against DFA attacks
2001 was an exciting time for cryptography, as the new Advanced Encryption Standard (AES) specification was finalized, making a mathematically secure and performant encryption …

Businesses recognize the need for AI & ML tools in cybersecurity
71 percent of businesses surveyed in the United States plan to use more artificial intelligence and machine learning (AI/ML) in their cybersecurity tools this year, although …

Companies unprepared for PSD2, stricter EU requirements will drive fraud to other regions
A new iovation report includes original research and analyzes the consequences for the global online payments market around the revised Payment Services Directive (PSD2). By …

Urgent need for IT security legal framework in Europe
Information transmission, transport, industrial production, research, administration – hardly any area can manage without modern information and communication …

Researchers expose massive mobile adware and data stealing campaigns with 250 million downloads
Check Point Research has uncovered two massive mobile adware and data stealing campaigns, which have already had over 250 million downloads combined globally. Both target …

The threat of quantum computers and the solutions that can protect us today
In this Help Net Security podcast recorded at RSA Conference 2019, Avesta Hojjati, Head of R&D at DigiCert, talks about the threat of quantum computers and the solutions …

Network performance requirements grow in the era of 5G: Are your security processes ready?
The new generation of 5G cellular networks are beginning to be rolled out in leading countries like the U.S., bringing to life the promise of connecting everything from …

How susceptible are hospital employees to phishing attacks?
Cybersecurity threats are a rising problem in society, especially for healthcare organizations. Successful attacks can jeopardize not only patient data but also patient care, …

Data management challenges are having a severe impact on profitability
Global organizations are scrambling to gain a competitive advantage in today’s digital economy, but failure to effectively manage their data can end up costing them …

Exploitation of vulnerabilities in Moxa industrial switches could disrupt communication between ICS components
Positive Technologies experts Ivan Boyko, Vyacheslav Moskvin, and Sergey Fedonin have discovered multiple vulnerabilities in Moxa industrial switches in the EDS-405A, …
Featured news
Resources
Don't miss
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works