Help Net Security
Data and AI professionals prioritize learning new skills amid labor shortage
O’Reilly announced the results of a survey, which revealed that 64% of respondents took part in training or obtained new certifications in the past year to build upon their …
5G trends accelerating, all major regions pursuing 5G Core testing and deployments
5G trends are continuing to accelerate, with 5G SA Core evaluation, testing and launch activities growing significantly across all geographic regions, according to Spirent. In …
Keys to the cloud: Unlocking digital transformation to enhance national security
According to recent research, federal spending on cloud computing is anticipated to grow from $6.8 billion in 2020 to nearly $7.8 billion in 2022. As this adoption …
Bot attack volumes growing 41% year over year, human-initiated attacks down 29%
Bot attack volumes grew 41% year over year with human-initiated attacks falling 29%, according to a report from LexisNexis Risk Solutions. The report confirms earlier trend …
The long-term impacts of the pandemic on internal audit teams
AuditBoard announced the results of a survey of corporate chief audit executives (CAEs) that reveals the long-term impacts of COVID on their operations and the profession at …
CPaaS market value to exceed $10 billion in 2022
A study from Juniper Research has found the global value of the CPaaS market will exceed $10 billion for the first time in 2022; rising from $8.6 billion in 2021. This …
MSPs that cannot modernize will find themselves and their clients falling behind
MicroAge sought feedback from IT professionals to explore the performance of modern (and not-so-modern) managed service providers (MSPs). The survey found that even …
Firms embracing hybrid working, but must ensure teams have the modern skills to stay productive
Employers must act now to ensure staff have the modern skills to stay productive during hybrid working, says Questionmark. While firms are continuing to let staff work …
The 5 Ws for building a strong cybersecurity plan
Creating a cybersecurity plan is the first step in starting secure and staying secure. Consider this when planning a budget, getting support from staff, and creating company …
9 tips to avoid cloud configuration conundrums
Configuration-related errors continue to result in avoidable losses of customer data and, consequently, their trust and loyalty, as well as revenue. The recent T-Mobile breach …
Most Fortune 500 companies’ external IT infrastructure considered at risk
Nearly three quarters of Fortune 500 companies’ IT infrastructure exists outside their organization, a quarter of which was found to have a known vulnerability that threat …
Ransomware preparedness is low despite executives’ concerns
86.7% of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a recent …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)