Help Net Security
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095430/ciso-400x200.jpg)
How to build a better CISO
The technology industry has long been categorized by its ability to transform at the blink of an eye. If you think back 20 years, the internet was just picking up consumer …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100610/windows-400x200.jpg)
43% of businesses are still running Windows 7, security threats remain
With one year to go until Microsoft ends support for its ten-year-old operating system Windows 7, as many as 43% of enterprises are still running the outdated platform. …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095939/architecture-400x200.jpg)
90% of companies face significant obstacles with digital transformation
Nearly eight in 10 (79 percent) companies are in the process of digital transformation, but the vast majority, 90 percent, are facing significant obstacles to success. The new …
![binary bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112818/binary-bomb-400x200.jpg)
SmokeLoader malware downloader enters list of most wanted malware
Check Point has published its latest Global Threat Index for December 2018. The index reveals that SmokeLoader, a second-stage downloader known to researchers since 2011, rose …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
Considering an SD-WAN deployment? The best solution may already be in your network
When the internet goes down, business stops. Every business today relies on cloud applications to run day-to-day operations, including CRM applications like Salesforce, …
![success](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113141/success-400x200.jpg)
Why security by design and security DevOps are so critical to success
The advances made in technology throughout the past several decades have brought about an inevitable digital transformation, which companies are experiencing in today’s world. …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101202/business-400x200.jpeg)
Most organizations are migrating data for ERP apps to the cloud
According to a Cloud Security Alliance survey, 69 percent of organizations are migrating data for popular ERP applications to the cloud, moving to major cloud …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
Revenue from sales of IT infrastructure products for cloud environments reached $16.8 billion
According to the IDC, vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111503/abstract-arrows-400x200.jpg)
Week in review: How data becomes intelligence, email security predictions, EU bug bounties
Here’s an overview of some of last week’s most interesting news and articles: The attack surface is growing faster than it has at any other point in the history of …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100605/healthcare-400x200.jpg)
Four cybersecurity trends every CIO should know
The cybersecurity landscape in 2019 will likely bolster bigger, more complex threats and developments. Given the intricacy of today’s cyber security challenges, organisations …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
There’s a sizable gap between confidence in security programs and their effectiveness
A Syncsort survey of over 300 respondents found that while 85 percent of respondents are either very or somewhat confident in their organization’s security program, 41 percent …
![Euro](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095437/euro-400x200.jpeg)
Evaluating €1bn in cybersecurity research funding
Crossword Cybersecurity looked at nearly 1,200 current and past research projects from academic institutions in the United Kingdom, United States, Europe, Australia, and …
Featured news
Sponsored
Don't miss
- Review: Action1 – Simple and powerful patch management
- Securing remote access to mission-critical OT assets
- Coding practices: The role of secure programming languages
- Some good may come out of the CrowdStrike outage
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)