cybersecurity
![employee](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101041/employee-400x200.jpeg)
Sometimes employees follow cybersecurity best practices beyond company policies
Nearly two-thirds (64%) of employees use a company-approved device for work. However, less than half (40%) of those who use a personal device are regulated when using that …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101057/healthcare-400x200.jpg)
Rising concerns about managing risk and proving compliance in the medical device industry
Perforce Software released the results of a global survey of medical device professionals. Key findings show increased concerns for mitigating risk and proving compliance …
![business happy](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101049/business-happy-400x200.jpeg)
Are security pros happy with their jobs and salaries?
Do security professionals like their jobs and would they recommend a career in cyber security to those looking into one? What do they like about their jobs and what motivates …
![White House](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101100/white_house-400x200.jpg)
White House eliminates Cybersecurity Coordinator role
The White House has eliminated the role of Cybersecurity Coordinator, generally viewed as the top cybersecurity role in the US government. The decision was made by John …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101103/data-400x200.jpg)
Companies ditch data as GDPR deadline approaches
A new study from IBM reveals that nearly 60 percent of organizations surveyed are embracing the GDPR as an opportunity to improve privacy, security, data management or as …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101108/analyst-400x200.jpg)
Threat analytics: Keeping companies ahead of emerging application threats
Every application that is downloaded via an app store runs in a zero-trust environment. When a protected app is published to an official app store, an open loop of protection …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101750/cryptocurrency2-400x200.jpg)
25% of companies affected by cloud cryptojacking
Cryptojacking has unquestionably gone mainstream. Despite heavy media and industry attention, organizations are struggling to meet compliance requirements in public cloud …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105123/person-400x200.jpg)
Insider threat blind spot enables employee revenge attacks
Based on threat assessments from global organizations in public and private sector industries, Dtex Systems determined there are active insider threats in all assessed …
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
The pace of vulnerability disclosure shows no signs of slowing
Unless the pace of vulnerability disclosure slows down in the coming quarters, we are looking at yet another record-breaking year, according to Risk Based Security’s …
![analysis](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101116/analysis-400x200.jpg)
Combating fraud and money laundering with graph analytics
Dirty money and money laundering have been around since the existence of currency itself. On a global level, as much as $2 trillion is washed annually, estimates the United …
![automate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101757/automate-400x200.jpg)
Automating web app testing to secure your environment
In this podcast recorded at RSA Conference 2018, Dave Ferguson, Director, Product Management for Web Application Security at Qualys, talks about the challenges and benefits of …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
Exposing the threat of shadow devices
Infoblox announced new research that exposes the significant threat posed by shadow devices on enterprise networks. Researchers found that enterprise networks across the US, …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?