Help Net Security

Top cyber concerns plaguing digital enterprises
69% of senior security and IT executives say digital transformation is forcing fundamental changes to existing cybersecurity strategies, according to BMC and Forbes Insights. …

Unsanctioned cloud services present growing problem for organizations
Enterprise cloud service usage continues to rise, and despite the best efforts of IT, unsanctioned cloud service usage remains a problem as half of all users of sanctioned …

The rewards of advanced agile and DevOps adoption
In today’s fiercely competitive environment for customer satisfaction and brand loyalty, agile and DevOps are driving happier customers and employees. Results from a new CA …

Addressing the challenges of vulnerability coordination
The FIRST Vulnerability Coordination Special Interest Group (SIG) made available for public comment through January 31, 2017 the draft Guidelines and Practices for Multi-party …

Is your Windows 10 migration strategy leaving you vulnerable?
Despite enhanced security being a key driver in the move to Windows 10, many organizations are putting their security at risk with their choice of migration strategy, …

Ransom is the main motivation behind cyber attacks
49% of businesses confirmed being the subject of a ransom campaign in 2016, according to Radware. What’s more, 27% of IT professionals surveyed chose data leakage or loss as a …

How the application landscape is impacting IT organizations
Accelerating cloud adoption is creating increased demand for security application services including WAF, DNSSEC, and DDoS protection, according to F5 Networks. As an increase …

New security concerns due to business complexities
It is estimated that in 2016, more than $94 billion will be invested in security solutions, per industry analyst forecasts, yet nearly half of organizations report having had …

Will 2017 be the year of ransomworm?
It’s safe to say that 2016 was the year of ransomware. More specifically, the year of crypto-ransomware, that nefarious variant that encrypts files and holds them captive …

Employee burnout: The biggest workplace challenge in 2017
The biggest threat to building an engaged workforce in 2017 is employee burnout. A new study by Kronos and Future Workplace found 95 percent of human resource leaders admit …

CISSP Planning Kit: Your guide to CISSP certification and beyond
Studying for the CISSP exam can seem overwhelming, which is why ISC2 developed this quick guide. Download this planning kit for a CISSP overview, study tips, preview of how to …

Information security consulting market to reach $26.15 billion by 2021
According to a new report by MarketsandMarkets, the information security consulting market is estimated to grow from $16.12 billion in 2016 to $26.15 billion by 2021, at a …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)