Features
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104411/gdpr-1-400x200.jpg)
Why companies shouldn’t dread the advent of GDPR
The main aim of the General Data Protection Regulation (GDPR) is to make sure that the data of EU citizens is protected, no matter where it’s held. The regulation, which will …
![architect](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104055/architect-400x200.jpg)
What’s an IT architect, and could you become one?
If you’re a Computer Science student or an IT professional looking for a new job that’s interesting, well paid, and for which demand is constant, you might want to …
![cube](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104306/cube-400x200.jpg)
Software security assurance: Everybody’s invited
As more and more things in this world of ours run on software, software security assurance – i.e. confidence that software is free from vulnerabilities (either …
![Businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104440/businessman-400x200.jpg)
Security awareness is good, but good security culture is better
As an efficient mechanism to influence employee behavior, security culture is one of the most important, yet most overlooked, aspects of organizational security. “A …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104506/spotlight-400x200.jpeg)
Executive spotlight: iovation’s new Vice President of Product
Last week iovation announced that Dwayne Melancon was leaving Tripwire after 17 years and joining the company as the new Vice President of Product, so we decided to get in …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104514/wifi-400x200.jpg)
Lure10: Exploiting Wi-Fi Sense to MITM wireless Windows devices
Karma has long been a staple man-in-the-middle attack used in authorised wireless security assessments and unsanctioned ones, but as many modern operating systems now provide …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104710/chess-1-400x200.jpg)
Deception security doesn’t have to be onerous or expensive
When talking about deception security, most infosec pros’ mind turns to honeypots and decoy systems – additional solutions that companies have to buy, deploy, and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105349/abstract-1-400x200.jpg)
Machine learning in information security: Getting started
Machine learning (ML) technologies and solutions are expected to become a prominent feature of the information security landscape, as both attackers and defenders turn to …
![woman](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105018/woman-400x200.jpg)
Women in infosec: Real-life experiences and challenges
In all segments of society and business, minorities encounter problems that the majority rarely or never faces. And information security is – I think we can all agree …
![kaspersky Lab KIPS](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105554/kasperskylab-kips-400x200.jpg)
Cybersecurity gamification: A shortcut to learning
Cybersecurity awareness trainings are usually a boring affair, so imagine my colleagues’ surprise when I exited the room in which I participated in a demonstration of …
![Deepquest](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105656/deepquest-400x200.jpg)
Next level red teaming: Working behind enemy lines
The term “hacker” calls forth both positive and negative mental pictures, but I can bet that there are not many people, even in the infosec community, to whom the …
![checklist](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105851/checklist-400x200.jpg)
A checklist for people who understand cyber security
By now, it’s pretty much an accepted reality that it’s only a matter of time until an organization – any organization – gets breached by cyber …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege