cybersecurity
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Alarming number of consumers impacted by identity theft, application fraud and account takeover
A new report, developed by Aite Group, and underwritten by GIACT, uncovers the striking pervasiveness of identity theft perpetrated against U.S. consumers and tracks shifts in …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101639/connection-400x200.jpg)
How digital leaders built a foundation for resiliency in the face of disruption
During the past year, digital leaders deployed a remote workforce, engaged customers via contactless delivery and weathered various business disruptions throughout the year. …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
A strategic approach to identity verification helps combat financial crime
70% of financial services organizations are taking a strategic approach to identity verification to combat financial crime and stay one step ahead of fraudsters according to …
![remote workforce protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/08091029/remote_workforce_protection2-400x200.jpg)
Rise in remote work leads to increase in IT security gaps
Companies have not done enough to prevent heightened security risk in light of remote working, according to Lynx Software. In fact, 36% have been, or know someone who has …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094406/cloud1-400x200.jpg)
Passing a compliance audit in the cloud doesn’t have to be hard
Companies are required to comply with regulations that set standards specific to financial and size thresholds, industry type, customer categories, or other parameters. But …
![World](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/12192712/world-lines-red-400x200.jpg)
Defending enterprise systems during a pandemic
A new report from Akamai looks back at 2020, examining some of the technological shifts and the patterns that emerged from lockdown-related internet spikes at the beginning of …
![COVID-19](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/17144128/covid-19-hospital-400x200.jpg)
372% increase in healthcare bot traffic could tamper with booking vaccine dates
Nations around the world are racing to acquire COVID-19 vaccines and assemble digital infrastructure and web applications to enable appointment booking. As they do this, …
![smart cybersecurity spending](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104414/smart_cybersecurity_spending-400x200.jpg)
Most decision makers plan to increase spending on cybersecurity this year
Budget cuts, redundancies, delays to cyber resilience projects and increased remote working in the last 12 months could all have increased organizations’ risk of a cyber …
![woman](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105018/woman-400x200.jpg)
49% of female cybersecurity pros say the pandemic had a positive impact on their career
While the global job market has been hit hard by the pandemic, cybersecurity job recruitment thrived in 2020. According to a new global report from Tessian, 94% of security …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19093544/fighter-brain-tech-400x200.jpg)
Starting your cybersecurity career path: What you need to know to be successful
As COVID-19 spread across the world, organizations found themselves more exposed to cyber threats than ever before and the cybersecurity skills gap became even more obvious. …
![SOAR](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/08191934/soar-solution-400x200.jpg)
How do I select a SOAR solution for my business?
Security Orchestration, Automation and Response (SOAR) products offer an appealing solution, promising efficiencies in detecting and responding to threats. However, …
![security awareness](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18071416/sec-awareness-400x200.jpg)
Security awareness programs: The difference between window dressing and behavior change
CISOs are responsible for pursuing cybersecurity purchases that align with the overall health of their organizations. All investments must drive tangible value and ROI while …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality