Help Net Security
![COVID-19](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/07134313/covid-19-mask-400x200.jpg)
COVID-19 is driving diverging perspectives as enterprises decide which technologies to focus on
Technology executives, C-suite leaders and senior executives in areas such as IoT, DevOps, security, and embedded development—from both the U.S. and China are realigning their …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/19131621/lock-half-400x200.jpg)
CEOs and CISOs disagree on cyber strategies
There are growing disparities in how CEOs and CISOs view the most effective cybersecurity path forward, according to Forcepoint. The global survey of 200 CEOs and CISOs from …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
With the threat landscape continuously changing, businesses must be ready for anything
Despite efforts by organizations to layer up their cyber defenses, the threat landscape is changing, attackers are innovating and automating their attacks, NTT reveals. The …
![DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093110/DevOps-1-400x200.jpg)
With increased DevOps adoption, roles in software development teams are changing
Roles across software development teams have changed as more teams adopt DevOps, according to GitLab. The survey of over 3,650 respondents from 21 countries worldwide found …
![mobile code](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102643/mobile-code-400x200.jpg)
Technologies in all layers of the cloud stack are at risk
As breaches and hacks continue, and new vulnerabilities are uncovered, secure coding is being recognized as an increasingly important security concept — and not just for …
![vectors](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103046/vectors-400x200.jpeg)
Over half of security leaders still rely on spreadsheets
Senior security leaders within financial services companies are being challenged with a lack of trusted data to make effective security decisions and reduce their risk from …
![climb](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100634/climb-400x200.jpg)
CISOs are critical to thriving companies: Here’s how to support their efforts
Even before COVID-19 initiated an onslaught of additional cybersecurity risks, many chief information security officers (CISOs) were struggling. According to a 2019 survey of …
![Kill Chain HBO](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27153202/killchain_hbo-400x200.jpg)
Review: Kill Chain: The Cyber War on America’s Elections
Kill Chain is an HBO documentary made and produced by Simon Arizzone, Russell Michaels and Sarah Teale. Kill Chain: Inside the documentary Arizzone and Michaels already worked …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110326/puzzle-400x200.jpg)
How a good user experience brings the pieces of the enterprise IT jigsaw together
Have you ever done a jigsaw puzzle with pieces missing? Or tried to do a complicated one with only part of the picture showing on the box lid? If so, you will know how it …
![Think](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100555/think-400x200.jpg)
Mental Health Awareness Week: Coping with cybersecurity pressures amidst a global pandemic
As most of the UK’s cybersecurity workforce now sits at home isolated while carrying out an already pressurised job, there is every possibility that this could be affecting …
![containers](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095724/containers-400x200.jpg)
How data intelligent organizations mitigate risk
Organizations that put data at the center of their vision and strategy realize a differentiated competitive advantage by mitigating cost and risk, growing revenue and …
![shadow IT](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093940/shadow-it-400x200.png)
Security threats associated with shadow IT
As cyber threats and remote working challenges linked to COVID-19 continue to rise, IT teams are increasingly pressured to keep organizations’ security posture intact. When it …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege