![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
DevSecOps is maturing, 62% of organizations have a team in place
During RSA Conference 2018, Aqua Security surveyed 80 security professionals to gain their unfiltered, high-level perspective on the fast-emerging discipline of DevSecOps. …
![Tyrion](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09100956/tyrion-got-400x200.jpg)
What CISOs can learn from Tyrion on Game of Thrones
Game of Thrones is a gripping, global phenomenon. One of the main reasons for its popularity is its nuanced portrayal of characters who are not 100% good or evil. Over seven …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105446/risk-400x200.jpg)
Quantifying cyber exposure: Attackers are racing ahead
Cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims, potentially siphoning sensitive data, …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101017/healthcare-1-400x200.jpg)
1 in 10 healthcare organizations paid a ransom within the last year
More than one in three healthcare organizations have suffered a cyberattack within the last year, while almost one in 10 have paid a ransom or extortion fee, according to …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113318/danger-400x200.jpg)
Pressures impacting security pros are up, threats are turning up the heat
Trustwave released the 2018 Security Pressures Report based on a global survey of 1,600 full-time IT professionals who are security decision makers or security influencers …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101014/gdpr-1-400x200.jpg)
It’s time to embrace GDPR
The noise around the General Data Protection Regulation (GDPR) has been unavoidable, and for good reason. GDPR is coming into effect in a few short days (May 25 to be exact). …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
The ethical and legal dilemmas of threat researchers
Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101051/tunnel-400x200.jpg)
Most businesses believe stronger data protection policies will lead to fewer breaches
In light of new data privacy legislations, a new Webroot report looks at how businesses in the U.S., U.K., and Australia are adjusting to new data security measures in order …
![business happy](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101049/business-happy-400x200.jpeg)
Are security pros happy with their jobs and salaries?
Do security professionals like their jobs and would they recommend a career in cyber security to those looking into one? What do they like about their jobs and what motivates …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101108/analyst-400x200.jpg)
Threat analytics: Keeping companies ahead of emerging application threats
Every application that is downloaded via an app store runs in a zero-trust environment. When a protected app is published to an official app store, an open loop of protection …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104457/gdpr-400x200.jpg)
GDPR compliance: Identifying an organization’s unique profile
After a two-year transition period, the General Data Protection Regulation (GDPR) becomes enforceable beginning 25 May 2018. Presumably, many large companies have been working …
![ignore](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101125/ignore-400x200.jpg)
Too many IT pros ignore critical security issues
A recent Outpost24 survey of 155 IT professionals, which revealed that 42 percent ignore critical security issues when they don’t know how to fix them (16 percent) or don’t …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history