Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
connection
The future of digital infrastructure: Top 10 predictions

IDC’s top 10 predictions for the future of digital infrastructure point to a digital infrastructure strategy that addresses resiliency and trust; data-driven operational …

architecture
As technology pervades, CIOs’ influence on business strategy grows

An IBM Institute for Business Value (IBV) study revealed CIOs’ influence on business strategy and operations is growing as technology pervades surveyed enterprises. When …

bomb
Most CIOs and CISOs underestimate the risk of an OT breach

A research study by Skybox Security found that 83% of organizations suffered an operational technology (OT) cybersecurity breach in the prior 36 months. The research also …

Ten CIO agenda predictions that will impact IT pros by 2026

According to an IDC report, through 2026, 65% of CIOs will sustain a cycle of tech-based empowerment, agility, and resilience through collaborative governance, new service …

puzzle
Business composability: Mastering the risk of accelerating change and creating new business value

Enterprises must embrace business composability to thrive through disruption in 2022 and beyond, according to Gartner’s survey of CIOs and technology executives. Business …

analyst
Three key areas CIOs should focus on to generate value

To accelerate value creation, CIOs and IT executives should focus on three key areas – leading from anywhere, nurturing connections and reaching beyond, according to Gartner. …

reload
How digital transformation impacted CIO and CTO roles

Transposit announced results from a recent research study about the evolving roles of the CIO and CTO, as well as the extent of and attitudes towards adoption of DevOps …

SaaS
40% of SaaS assets are unmanaged, putting companies at risk for data leaks

DoControl announced a report which provides data-driven insights into the growing number of external and insider threats due to vast amounts of unmanageable data in today’s …

zero
How to foster collaboration with the IT team for a successful zero trust implementation

The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent Executive Order, which …

ransomware
Ransomware and cyber insurance: What are the risks?

High-profile ransomware events, such as the Colonial Pipeline and Kaseya attacks, continue to create eye-popping headlines about how easily a cybercriminal group can cripple …

cloud
Can the public cloud become confidential?

It’s been often said that the only two certain things in life are death and taxes. Over the past ten years, it seems data breaches can be added to this list. Can an …

brain
How security leaders can build emotionally intelligent cybersecurity teams

How a leader motivates their team, gathers, and uses information, makes decisions, manages change initiatives, and handles crises is referred to as “leadership style”, and is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools