• News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter
(IN)SECUREMagazine
 

Featured news

  • The importance of consumer trust in the second-hand mobile market
  • 2018 saw 6,515 reported breaches, exposing 5 billion sensitive records
  • Three reasons employee monitoring software is making a comeback
  • Machine learning fundamentals: What cybersecurity professionals need to know
  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Mozilla will use AI coding assistant to preemptively catch Firefox bugs
  • SaaS spending increasing by 78 percent year-over-year
  • How organizations handle disruptive data sources
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
  • Most wanted malware in January 2019: A new threat speaks up

data security

Get our Top Stories to your inbox
mobile device

The importance of consumer trust in the second-hand mobile market

  • February 18, 2019
  • Blancco Technology Group
  • data breach
  • data security

58 percent of global consumers have yet to trade in an old mobile device, though almost two-thirds (64%) globally reported they would be willing to do so if more stringent …

puzzle

How organizations handle disruptive data sources

  • February 15, 2019
  • cloud adoption
  • cybersecurity
  • data security

In the 2018 Data Connectivity Survey by Progress, more than 1,400 business and IT professionals in various roles across industries and geographies shared their insights on the …

glasses

There’s a growing disconnect between data privacy expectations and reality

  • February 11, 2019
  • cybersecurity
  • data breach
  • data security

There is a growing disconnect between how companies capitalize on customer data and how consumers expect their data to be used, according to a global online survey …

EU

8 months of GDPR: 59,000+ reported breaches, 91 fines

  • February 7, 2019
  • compliance
  • cybersecurity
  • data protection

A little over eight months have passed since the EU General Data Protection Regulation (GDPR) became enforceable, but it’s becoming clear that sweeping data breaches …

data

Is your organization ready for the data explosion?

  • February 1, 2019
  • CIO
  • CISO
  • cybersecurity

“Data is the new oil” and its quantity is growing at an exponential rate, with IDC forecasting a 50-fold increase from 2010 to 2020. In fact, by 2020, it’s estimated that new …

cloud

Enterprises are struggling with cloud complexity and security

  • January 30, 2019
  • data security
  • digital transformation
  • IDC

The rush to digital transformation is putting sensitive data at risk for organizations worldwide according to the 2019 Thales Data Threat Report – Global Edition with research …

lock

The most effective security strategies to guard sensitive information

  • January 25, 2019
  • authentication
  • biometrics
  • CIO

Today’s enterprise IT infrastructures are not largely hosted in the public cloud, nor are they SaaS-based, with security being the single largest barrier when it comes to …

servers

Organizations waste money storing useless IT hardware

  • January 24, 2019
  • Blancco Technology Group
  • Coleman Parks
  • compliance

A survey of 600 data center experts from APAC, Europe and North America reveals that two in five organizations that store their data in-house spend more than $100,000 storing …

fingers crossed

Should enterprises delay efforts to remediate most vulnerabilities?

  • January 23, 2019
  • CISO
  • cybersecurity
  • Cyentia Institute

Companies today appear to have the resources needed to address all of their high-risk vulnerabilities. The research demonstrates that companies are getting smarter in how they …

numbers

Encryption is key to protecting information as it travels outside the network

  • January 17, 2019
  • cybersecurity
  • data protection
  • data security

A new Vera report reveals stark numbers behind the mounting toll of data breaches triggered by cybercrime and accidents. One of the most recognized and mandated security …

Posts navigation

1 2 3 4 5 6 … 12 Next
bot

Machine learning fundamentals: What cybersecurity professionals need to know

  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
Spot
light
NIST Cybersecurity Framework: Five years later

What's New

mobile device

The importance of consumer trust in the second-hand mobile market

earth

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

puzzle

How organizations handle disruptive data sources

hand

Increased appetite for biometrics fueled by speed, security and convenience

business

SaaS spending increasing by 78 percent year-over-year

Don't miss

earth

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

programmer

Three reasons employee monitoring software is making a comeback

bot

Machine learning fundamentals: What cybersecurity professionals need to know

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

hand

Increased appetite for biometrics fueled by speed, security and convenience

vault

Bank of Valletta suspended all operations in wake of cyber attack

danger

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

fire

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Linux

Snapd flaw gives attackers root access on Linux systems

patch

February 2019 Patch Tuesday: PrivExchange hole plugged

question

SMBs spending a day each week dealing with cybersecurity issues

 
(IN)SECURE Magazine

Newsletters

Subscribe to get regular updates from Help Net Security. The weekly newsletter contains a selection of the best stories, while the daily newsletter highlights all the latest headlines!

  • Start
  • News
  • Malware
  • Articles
  • Reviews
  • Events
  • Copyright 1998-2019 by Help Net Security
  • Read our privacy policy
  • About us
  • Advertise
  • Design by FatDUX

  • News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter

Copyright 1998-2019 by Help Net Security | Read our privacy policy | About us | Contact | Advertise

Design by FatDUX