digital transformation
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184922/biometrics2-400x200.jpg)
Novel face swaps emerge as a major threat to biometric security
Digital identities are rapidly becoming more widely used as organizations’ and governments’ digital transformation projects mature and users demand more remote accessibility …
![Woman working on laptop](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095739/woman-laptop-400x200.jpg)
Security teams expect breach and incident reporting requirements to create more work
Most IT security professionals will focus on improving “detect” and “respond” capabilities, amidst concern over increasing costs and regulatory pressures, according to …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
Leveraging the full potential of zero trust
More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, …
![Terminal](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/26101304/terminal-connect-400x200.jpg)
68% of IT leaders are worried about API sprawl
Axway announced new data from its inaugural 2022 Open Everything Strategy Survey Report, which found that nearly 40% of organizations are in the process of adopting a new …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/05174135/shield-400x200.jpg)
CISOs’ priorities for the coming year
BlueFort Security has announced the results of its 2022 CISO survey, which revealed that while CISOs are still experiencing challenges around visibility, intelligence and …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092947/lock-400x200.jpg)
Are your cybersecurity investments making you less resilient?
In the past decade, digital transformation has become a buzzword in nearly every industry. Organizations have scaled down workforces in favor of automation, moved their …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104924/building-400x200.jpg)
6 key challenges technologists are facing today
Every organization that interacts with customers or consumers via web and mobile applications, and also as they transition to a hybrid workspace, means that they are …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093421/gears-400x200.jpg)
What’s challenging development teams amid their race to the cloud?
Couchbase announced findings from industry research examining the challenges faced by development teams amid the race to the cloud and to execute on digital transformation …
![innovation](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093753/innovation-400x200.jpg)
CIOs find it most difficult to solve cybersecurity challenges
A global research study from Lenovo reveals how the CIO role has evolved, shedding light on growing areas of responsibility and increasing influence in the C-Suite, as well as …
![cloud hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110822/cloud-hand-400x200.jpg)
How vulnerable supply chains threaten cloud security
Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their …
![Dan Tucker](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/17145844/dan_tucker-2-booz_allen_hamilton-400x200.jpg)
How government CISOs tackle digital transformation initiatives
In this interview for Help Net Security, Dan Tucker, Senior VP at Booz Allen, and leader of the firm’s cloud and data engineering solutions for citizen services, talks about …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094016/drown-400x200.jpg)
Burnout and attrition impact tech teams sustaining modern digital systems
Digitalization and rising consumer expectations are having a major impact on the working conditions of the technology teams sustaining the digital operations that drive the …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege