Please turn on your JavaScript for this page to function normally.
person
How to incorporate human-centric security

Cybersecurity is awash in threat detection and mitigation solutions: SIEM, DLP, SOAR, MDR, EDR, XDR, and more. Threat detection is essential, as it serves to locate and …

Woman working on laptop
Consumers plan to be more consistent with their security in 2024

The vast majority of consumers are concerned that cyberattacks will increase or remain consistent over the coming year (97%) and become more sophisticated (69%), outpacing the …

dev
IT workers see generative AI as a serious threat to their profession

While many IT workers see the productivity benefits of AI, 56% believe it benefits employers more than employees, according to Ivanti. Additionally, 63% are concerned …

data analytics
Cybersecurity risks dampen corporate enthusiasm for tech investments

64% of IT leaders believe that cybersecurity concerns are negatively impacting their organization’s willingness to invest in innovative tech, according to a report by HPE …

mental health
Heavy workloads driving IT professionals to resign

A quarter of IT professionals are seriously contemplating leaving their current jobs within the next six months, potentially costing US companies upwards of 145 billion …

Mark O'Neill
Balancing telecom security, law enforcement, and customer trust

In this Help Net Security interview, Mark O’Neill, CTO at BlackDice Cyber, talks about collaboration, transparent policies, and a security-first mindset. As 5G and IoT emerge, …

Michael Adams
Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the future

In this Help Net Security interview, we delve into the world of cybersecurity with Michael Adams, the CISO at Zoom. Adams analyzes how organizations grapple with the effects …

Charles Brooks
CISOs under pressure: Protecting sensitive information in the age of high employee turnover

In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks …

connections
Employees worry less about cybersecurity best practices in the summer

IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely, …

zero trust
Organizations actively embrace zero trust, integration remains a hurdle

IT teams have made security efforts and progress in zero-trust implementation strategies to establish a new sense of normalcy following the network upheaval caused by the …

STEM
Demand for STEM training skyrockets

The rapid pace of globalization, digital transformation, and AI advancements have created a renewed demand for digital and human skills among US learners, according to …

Jay Chaudhry
Navigating cybersecurity in the age of remote work

In this Help Net Security interview, Jay Chaudhry, CEO at Zscaler, talks about connecting and securing remote employees and their devices to access organizational resources …

Don't miss

Cybersecurity news