• News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter
(IN)SECUREMagazine
 

Featured news

  • The importance of consumer trust in the second-hand mobile market
  • 2018 saw 6,515 reported breaches, exposing 5 billion sensitive records
  • Three reasons employee monitoring software is making a comeback
  • Machine learning fundamentals: What cybersecurity professionals need to know
  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Mozilla will use AI coding assistant to preemptively catch Firefox bugs
  • SaaS spending increasing by 78 percent year-over-year
  • How organizations handle disruptive data sources
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
  • Most wanted malware in January 2019: A new threat speaks up

cloud adoption

Get our Top Stories to your inbox
puzzle

How organizations handle disruptive data sources

  • February 15, 2019
  • cloud adoption
  • cybersecurity
  • data security

In the 2018 Data Connectivity Survey by Progress, more than 1,400 business and IT professionals in various roles across industries and geographies shared their insights on the …

lock

The most effective security strategies to guard sensitive information

  • January 25, 2019
  • authentication
  • biometrics
  • CIO

Today’s enterprise IT infrastructures are not largely hosted in the public cloud, nor are they SaaS-based, with security being the single largest barrier when it comes to …

F5 report

How IT organizations are transforming to meet the demands of the digital economy

  • January 17, 2019
  • cloud adoption
  • cybersecurity
  • DevOps

The 2019 State of Application Services report from F5 Networks showed that organizations regard application services as vital for cloud adoption and, ultimately, for success …

business

Most organizations are migrating data for ERP apps to the cloud

  • January 14, 2019
  • cloud adoption
  • Cloud Security Alliance
  • cybersecurity

According to a Cloud Security Alliance survey, 69 percent of organizations are migrating data for popular ERP applications to the cloud, moving to major cloud …

biohazard

Will sophisticated attacks dominate in 2019?

  • December 12, 2018
  • cloud adoption
  • cybersecurity
  • predictions

Trend Micro released its 2019 predictions report, warning that attackers will increase the effectiveness of proven attack methods by adding more sophisticated elements to take …

fast

Enabling the digital future: speed, agility and resilience

  • December 4, 2018
  • cloud adoption
  • digital transformation
  • Gartner

As more organizations embrace digital business, infrastructure and operations (I&O) leaders will need to evolve their strategies and skills to provide an agile …

cloud

What cloud platforms are DevOps professionals being asked to understand?

  • December 3, 2018
  • Cloud Academy
  • cloud adoption
  • cloud computing

Cloud Academy released its November 2018 Data Report revealing trends and shifts in the cloud computing industry. The world is trending multi-cloud Multi-cloud has become …

cloud

Cloud interoperability and app mobility outrank cost and security for primary hybrid cloud benefits

  • November 16, 2018
  • cloud adoption
  • cybersecurity
  • data security

Enterprises plan to increase hybrid cloud usage, with 91% stating hybrid cloud as the ideal IT model, but only 18% stating they have that model today, according to Nutanix. …

cloud

21% of all files in the cloud contain sensitive data

  • October 30, 2018
  • CISO
  • cloud adoption
  • cloud security

McAfee released its Cloud Adoption and Risk Report, which analyzed billions of events in anonymized customers production cloud use to assess the current state of cloud …

cloud

Organizations feel ready to put highly sensitive data in the cloud

  • October 29, 2018
  • Armor
  • CISO
  • cloud adoption

Many corporate employees are ready to store highly sensitive data in the cloud. However, many are still skeptical of the security posture of their own organizations, according …

Posts navigation

1 2 3 4 5 6 7 Next
bot

Machine learning fundamentals: What cybersecurity professionals need to know

  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
Spot
light
NIST Cybersecurity Framework: Five years later

What's New

mobile device

The importance of consumer trust in the second-hand mobile market

earth

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

puzzle

How organizations handle disruptive data sources

hand

Increased appetite for biometrics fueled by speed, security and convenience

business

SaaS spending increasing by 78 percent year-over-year

Don't miss

earth

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

programmer

Three reasons employee monitoring software is making a comeback

bot

Machine learning fundamentals: What cybersecurity professionals need to know

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

hand

Increased appetite for biometrics fueled by speed, security and convenience

vault

Bank of Valletta suspended all operations in wake of cyber attack

danger

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

fire

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Linux

Snapd flaw gives attackers root access on Linux systems

patch

February 2019 Patch Tuesday: PrivExchange hole plugged

question

SMBs spending a day each week dealing with cybersecurity issues

 
(IN)SECURE Magazine

Newsletters

Subscribe to get regular updates from Help Net Security. The weekly newsletter contains a selection of the best stories, while the daily newsletter highlights all the latest headlines!

  • Start
  • News
  • Malware
  • Articles
  • Reviews
  • Events
  • Copyright 1998-2019 by Help Net Security
  • Read our privacy policy
  • About us
  • Advertise
  • Design by FatDUX

  • News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter

Copyright 1998-2019 by Help Net Security | Read our privacy policy | About us | Contact | Advertise

Design by FatDUX