searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

data protection

Get our top stories in your inbox

SoniTalk: A new method for near-field communication

November 27, 2019

The technology is available for free and – contrary to similar technologies – focuses on security and data protection. In this way, SoniTalk leaves it up to the …

Growing complexity is driving operational changes to privacy programs

November 25, 2019

A majority of companies are adopting a single global data protection strategy to manage evolving privacy programs, and that managing the expanding ecosystem of third parties …

Top concerns for audit executives? Cyber risks and data governance

November 12, 2019

As organizations continue to collect customer and employee data, chief audit executives (CAEs) are increasingly concerned about how to govern and protect it. Gartner conducted …

Examining security process maturity in 400 organizations

October 30, 2019

There’s an overall failure in maturity of security processes of over 400 organizations in industries ranging from e-commerce, retail and payment processor to …

Companies vastly overestimating their GDPR readiness, only 28% achieving compliance

September 30, 2019

Over a year on from the introduction of the General Data Protection Regulation (GDPR), the Capgemini Research Institute has found that companies vastly overestimated their …

Some IT teams move to the cloud without business oversight or direction

September 20, 2019

27% of IT teams in the financial industry migrated data to the cloud for no specific reason, and none of them received financial support from management for their cloud …

More than a year after GDPR implementation, half of UK businesses are not fully compliant

September 12, 2019

52% of UK businesses are not fully compliant with the regulation, more than a year after its implementation, according to a survey of UK GDPR decision-makers conducted on …

Should social media organizations be subject to strict privacy regulation?

September 9, 2019

80% of IT security professionals agree that more security and privacy legislation is needed, especially for social media organizations that store personal data. However, …

When will the GDPR pot boil over? It’s sooner (and different) than you think

August 21, 2019

There’s an old saying that a watched pot never boils. In reality, the sauce in that pot is heating up in a way we can’t quite see yet. After the major compliance ramp by …

Automating CCPA compliance: Organize your data and manage requests

August 20, 2019

Time is running out for California-based businesses to prepare for the California Consumer Privacy Act (CCPA), which goes into effect on January 1, 2020. Despite the Act being …

Only 32% of government organizations consider a cloud-first strategy

August 6, 2019

The number of public sector organizations that are ready to implement a cloud-first strategy or move their entire infrastructures to the cloud has decreased by almost 20% …

Most SMBs have not identified and documented cybersecurity threats

July 25, 2019

A majority of small and medium-sized businesses (SMBs) do not have cybersecurity protection at the top of their agenda and are highly prone to risks and vulnerabilities, …

Posts navigation

1 2 3 4 5 6 7 8 9 10 … 20
bot

Proliferation of sneakerbots across industries: The long tail of DIY bot operators

  • Preparing for the Cybersecurity Maturity Model Certification onslaught
  • Protecting the digital workplace with an integrated security strategy
Free certification Exam Action Plan from (ISC)²

What's new

linux tux

Now-fixed Linux kernel vulnerabilities enabled local privilege escalation (CVE-2021-26708)

Microsoft Exchange

Exchange Servers targeted via zero-day exploits, have yours been hit?

10 CISO strategies

10 strategies small security teams can use for effective cybersecurity management

work from home

Enterprises observing uptick in risky behaviors since shift to remote work

Don't miss

Microsoft Exchange

Exchange Servers targeted via zero-day exploits, have yours been hit?

bot

Proliferation of sneakerbots across industries: The long tail of DIY bot operators

10 CISO strategies

10 strategies small security teams can use for effective cybersecurity management

puzzle

Preparing for the Cybersecurity Maturity Model Certification onslaught

malware

Multi-payload Gootloader platform stealthily delivers malware and ransomware

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • How do I select a cloud security solution for my business?
  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?
  • Tips for boosting the “Sec” part of DevSecOps

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise