Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
compliance
Compliance failures caused by lack of embedded controls into employee processes

Compliance teams that don’t embed their controls into employee processes face a significantly higher rate of compliance failures, according to a survey by Gartner. The survey …

containers
Increasing number of investigations calls for advanced technology and dedicated teams

Compliance Week conducted a survey which shows the importance of both advanced technology and dedicated teams that can quickly deliver data insights to reduce time and cost …

Healthcare IoT
What is the HIPAA Security Rule? Three safeguards to have in place

The past year has catalyzed a new era of healthcare, one where telehealth visits increased as we relied on online communication to keep ourselves informed and healthy. With …

container
Security and compliance still a challenge for container architectures

While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …

cloud
Things that are easy to miss in the race towards hybrid working and the cloud

The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …

hands
If encryption is so good at protecting data, why do so many businesses succumb to cyberattacks?

Cybercriminals use increasingly complex deception methods, and cybersecurity can be unfamiliar, unintuitive, or inconvenient to operate, recent Mimecast research reveals. No …

GDPR
SMEs awareness of GDPR is high, but few adhere to its legal requirements

85 percent of the small- to medium-sized enterprises (SMEs) in the UK are familiar with GDPR, but more than half are still not cleaning their data and therefore not adhering …

arrows
Stop the breaches! Four steps to minimize security risks

Ransomware, mobile phone hacks, and other cyber-attacks are an everyday occurrence, making cybersecurity one of the most pressing concerns for companies around the world. …

Apple
How to prepare for Apple’s Mail Privacy Protection

Over the last few years, consumers began to be more concerned and have greater understanding of the importance of privacy. In a recent survey conducted by Statista, over half …

hardware
Risky business: Steps for building an effective GRC program

Organizations across the board are facing governance, risk, and compliance (GRC)-related challenges. This is due to an over-management of GRC programs and the deployment and …

attacks
Cyberattacks on the rise, organizations increasingly interested in defensive technologies

Cyberattacks against enterprise infrastructure are on the rise in the U.K. as digital transformation expands the digital footprints—and the potential attack surfaces—of many …

privacy
Lack of email validation and opt-in processes hinder organizations from achieving compliance

Pathwire released the results of its Data Compliance Survey, a survey of 1,000 IT and marketing decision-makers across the globe on the most common data privacy and compliance …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools