![transform](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102903/transform-400x200.jpeg)
The price of an accelerated digital transformation
F5 announced a report which shows the challenges organizations face as they transform IT infrastructures to deliver and secure digital services that have become inseparable …
![Discord](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/04084233/discord-400x200.jpg)
Cybercriminals on Discord: Discovering developing threats
In this video for Help Net Security, Tal Samra, Cyber Threat Analyst at Cyberint, talks about Discord, a platform often used for cybercrime activities, and the possible …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094408/cloud2-400x200.jpg)
Cloud native application security is a critical priority, risk perception is worryingly low
Aqua Security has announced the results of a study which reveals that UK organizations have a long road ahead when it comes to understanding, planning and deploying their …
![apple](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104350/apple-400x200.jpg)
How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?
Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …
![Kids online](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/04142620/pexels-julia-m-cameron-4145355-400x200.jpg)
Still too many parents don’t monitor their children’s online activity
Pixalate announced the results of a Harris Poll survey examining American parents’ views about about online privacy concerning their children. The survey found that 48% …
![application](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27101818/application-blue-400x200.jpg)
Increasing security for single page applications (SPAs)
Single page applications (SPAs) have become the most popular way to create websites that feel faster for the end-user without hitting the server every time a user interacts …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
Apps, devices and workloads provide an ecosystem cornerstone for zero trust growth
As cybersecurity professionals, we admit it: zero trust has become the industry’s biggest buzzword. Some argue it’s a principle, others argue it’s a framework, others still …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094422/magnify-inspect1-400x200.jpg)
The importance of implementing security scanning in the software development lifecycle
Veracode published a research that finds most applications are now scanned around three times a week, compared to just two or three times a year a decade ago. This represents …
![Microsoft 365](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/09161033/microsoft365-1-400x200.jpg)
Organizations neglecting Microsoft 365 cybersecurity features
Nearly half of organizations are not using the full set of features and applications available in Microsoft 365, a research from Ensono reveals. Most notably, many enterprises …
![tax](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094837/tax1-400x200.jpg)
Beware of fake tax apps pushing malware
With the self-assessment tax deadline fast approaching in the UK, self-employed individuals will be looking to take advantage of the many apps that are on the market to help …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
How safe are cloud applications?
Netskope released a research highlighting the continued growth of malware and other malicious payloads delivered by cloud applications. The year-over-year analysis identifies …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102734/bulb-400x200.jpg)
Rethinking cybersecurity becomes imperative as devices and apps move away from physical offices
69.1% of professionals with security responsibility believe a rethink is needed to deal with the threat of cybersecurity now that devices and applications have moved outside …