![Think](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100555/think-400x200.jpg)
CEOs and business leaders trust AI, but employees are more cautious
Most senior executives (85%) classify themselves as artificial intelligence (AI) optimists, citing increased investment and trust in the technology. Eighty-seven percent say …
![Netsparker](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094741/netsparker-UI-400x200.jpg)
Identify web application vulnerabilities and prioritize fixes with Netsparker
In this Help Net Security podcast, Ferruh Mavituna, CEO at Netsparker, talks about web application security and how Netsparker is helping businesses of any size keep their web …
![Pathe](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095730/pathe-400x200.jpg)
BEC scammers stole €19m from film company Pathé
The Dutch branch of the French film production and distribution company Pathé has lost over 19 million euros to BEC scammers, Dutch News reported. The scam Information about …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095922/network1-400x200.jpg)
Consumer skepticism and stronger protections call for security changes
2018 became the year where protecting personal information established itself as a right that is wanted by and entitled to citizens. More people started questioning who owns …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
Your backup data sets can become a treasure trove for advanced threat detection
Despite ever increasing investments in security technologies, data breaches and cyber incidents are increasing at a relentless rate, and the problem is projected to keep …
![architect](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104055/architect-400x200.jpg)
DevOps and digital transformation initiatives are creating insecure apps
WhiteHat Security released its 2018 Application Security Statistics Report, “The Evolution of the Secure Software Lifecycle,” which identifies the security vulnerabilities and …
![stats](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102247/stats-400x200.jpeg)
Global spending on security solutions to reach $133.7 billion in 2022
Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to IDC. Although spending growth is expected to …
![light](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100048/light-400x200.jpg)
Bridging the priority gap between IT and security in DevOps
Let’s start with a test. Suppose that you manage a corporate network gateway across which a critical programmed transaction is scheduled to occur in exactly one hour. Suppose …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112759/risk-400x200.jpg)
In terms of main threat actors, expectation rarely matches reality
Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
You should prepare for the next mega data breach
As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112829/money-laptop-400x200.jpg)
Global information security spending to exceed $124 billion in 2019
Worldwide spending on information security products and services will reach more than $114 billion in 2018, an increase of 12.4 percent from last year, according to the latest …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
Making informed decisions: The importance of data driven security
When deciding what product to buy, the information the vendor offers about the product is helpful, but not nearly enough: you need to analyze individual product results and …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege