automation
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102325/iot-400x200.jpg)
Disruptive technology predictions: 2020 will see the creation of completely connected environments
Mainstream adoption of disruptive technologies in 2020 will finally see data, automation and IoT technologies come together to create connected cities and societies, NTT …
![automate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101757/automate-400x200.jpg)
Automated systems: Flag smarter, not everything
Imagine dealing with 1,000s of security alerts a day, whilst simultaneously juggling the tasks that are part of your day-to-day job. Challenging right? This is the current …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102423/network-400x200.jpg)
Network complexity and lack of visibility contribute to misconfigurations and increased risk
Enterprises are slow to abandon manual processes, despite being short staffed, as the lack of automation, coupled with increasing network complexity risk and lack of …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092947/lock-400x200.jpg)
Security and risk compliance: Still the most important part of IT strategy
Security practice is the number one priority for IT teams, with a clear majority (59%) reporting deficiencies in the controls, that should ensure data processing and storage …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092943/aid2-400x200.jpg)
Employees know vulnerabilities exist, but they can’t resolve them quickly enough
There is a sharp remediation gap between when organizations first detect vulnerabilities and when those issues are ultimately resolved, Adaptiva survey reveals. The survey …
![G Suite](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092750/gsuite-400x200.jpg)
G Suite admins get context-aware access controls, rule-based automated actions and alerts
Google is rolling out new security capabilities for G Suite Enterprise administrators, allowing them to implement context-aware access controls for users and to create rules …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100620/patch-400x200.jpg)
Want to overcome patching challenges once and for all? Automation is the key
The cybersecurity threatscape in the UK is extremely complex and sophisticated. It is no longer a question of whether a cyberattack will occur, but when; according to a recent …
![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113147/job_hunt-400x200.jpg)
Security pros like their job, yet many struggle with burnout and work-life balance
There is a persistent gap among cybersecurity professionals regarding gender and diversity, but also challenges with work-life balance. Lack of diversity Among the security …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102734/bulb-400x200.jpg)
Analysts explore the top strategic technology trends for 2020
Top ten strategic technology trends that organizations need to explore in 2020 have been identified. Gartner defines a strategic technology trend as one with substantial …
![key](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092913/keys-400x200.jpg)
How seriously are businesses taking their PKI security?
While most enterprises demonstrate a committed effort towards maintaining a well-rounded PKI setup, they still fall short in several key categories. The post-Black Hat survey …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110851/brain-400x200.jpg)
AI development has major security, privacy and ethical blind spots
Security, privacy and ethics are low-priority issues for developers when modeling their machine learning solutions, according to O’Reilly. Major issues Security is the most …
![cloud computing](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103311/cloud_computing-400x200.jpg)
How to start achieving visibility in the cloud
As a security executive, you have a curious gig. On one hand, you’re responsible for securing your organization across multiple systems, networks, clouds, and geographies. On …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD