Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
hole
Digital privacy: A double-edged sword

Digital privacy is paramount to the global community, but it must be balanced against the proliferation of digital-first crimes, including child sexual abuse, human …

digital transformation
Digital transformation: Affected and accelerated by COVID-19

97% of enterprise decision makers believe COVID-19 accelerated their company’s digital transformation efforts, according to a Twilio survey of over 2,500 enterprise decision …

Healthcare IoT
Healthcare technology goals and CIO challenges

LexisNexis Risk Solutions announced the results of its annual focus group, comprised of over 20 healthcare IT executives that are members of the College of Healthcare …

robot
Businesses express concerns around ethical risks for their AI initiatives

Businesses are entering a new chapter in AI implementation where early adopters may have to work harder to preserve an edge over their industry peers, according to Deloitte. …

person
CIOs are apprehensive about interruptions due to expired machine identities

TLS certificates act as machine identities, safeguarding the flow of sensitive data to trusted machines. With the acceleration of digital transformation, the number of machine …

cloud
Protecting corporate data in popular cloud-based collaborative apps

Cloud adoption has grown at an astonishing rate, providing organizations with the freedom to store data in numerous cloud applications that meet their specific business …

check
Despite spending more on compliance, businesses still have basic IT weaknesses

There is a misalignment between data privacy regulation spending and business outcomes, according to Tanium research. Specifically, as businesses spend tens of millions on …

search
The state of data quality: Too much, too wild and too skewed

We live in the age of data. We are constantly producing it, analyzing it, figuring out how to store and protect it, and, hopefully, using it to refine business practices and …

bot
Let’s be realistic about our expectations of AI

Pop culture contains no shortage of intelligent robots. When the tool became viable and widely available in real life, people brought a number of enthusiastic but unrealistic …

click
Surge in remote working reveals concerns around unprotected endpoints

Millions of US businesses forced to rapidly support home working for employees are facing significant challenges to securely manage their IT networks. New research from Tanium …

cloud
On my mind: Transitioning to third-party cloud services

During this extended period of social distancing filled with increased online activity, I can’t help but reflect on all the user data that has been created, stored, hacked, …

digital transformation
Challenges companies face when implementing digital transformation initiatives

For many organizations, digital initiatives in the pipeline became swift realities over the past several weeks, according to TEKsystems. New ways of working today have …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools