Read more about tips
Bookmark and Share
  • Guidance to improve risk management and IoT

    29.01.2015

    As connected devices infiltrate the workplace—some with IT’s knowledge and some without—both value and risk can increase significantly.

  • Companies need to be custodians of customer data, not owners

    29.01.2015

    Due to the fact that most students are under the age of legal consent and only beginning to establish a “digital footprint” that will follow them the rest of their lives, it’s not hard to understand why so many companies that serve this market agreed to follow a set of rules aimed at protecting the privacy of this special class of consumer.

  • 4 tips to make data protection everyone's business

    28.01.2015

    Most people wrongly assume that the burden of protecting workplace data across laptops, tablets and smartphones falls solely on your IT department.

  • IoT security and privacy best practices

    28.01.2015

    In a report on the Internet of Things (IoT), the staff of the Federal Trade Commission recommend a series of concrete steps that businesses can take to enhance and protect consumers’ privacy and security, as Americans start to reap the benefits from a growing world of Internet-connected devices.

  • How GitHub is redefining software development

    26.01.2015

    The security industry is slowly realizing what the developer community knew for years - collaboration is the key to and likely the future of innovation.




Spotlight

How GitHub is redefining software development

Posted on 26 January 2015.  |  The security industry is slowly realizing what the developer community knew for years - collaboration is the key to and likely the future of innovation.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Jan 29th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //