cybersecurity
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102449/puzzle-400x200.jpg)
Nearly half of security pros rarely change their security strategy, even after a cyber attack
Nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber attack. This level of cyber …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104943/hole-400x200.jpeg)
Cybersecurity pros don’t feel equipped to stop insider attacks
Based on interviews with nearly 1,500 cybersecurity professionals over three years, Haystax Technology released a study that makes it clear that organizations are feeling the …
![mobile apps](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102223/mobile-apps-400x200.jpg)
Mobile security: A look at the risks, and what you can do
A new report from Verizon found that organizations across numerous industries compromised mobile data security because of speed to market priorities and a lack of threat …
![automate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101757/automate-400x200.jpg)
Automating out of the skill gap sinkhole
The cybersecurity skills gap is one of the most daunting challenges facing the industry. We have a vibrant ecosystem of technology vendors developing shiny new tools, but the …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
A view of the global threat landscape: Cybercrime and intrusion trends
Established and well-resourced cyber operations will continue to innovate, developing new methods of distributing crimeware and incorporating advanced tactics to infiltrate, …
![earth](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111449/earthspace-400x200.jpg)
Global megatrends that are problematic for the state of cybersecurity
The majority of senior-level IT professionals fully expect their organization will experience a catastrophic data breach that could greatly impact shareholder value, according …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194554/money-400x200.jpg)
The economic impact of cybercrime? Almost $600 billion
Cybercrime costs businesses close to $600 billion, or 0.8 percent of global GDP, which is up from a 2014 study that put global losses at about $445 billion, according to a …
![Laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104809/laptop-dark-400x200.jpg)
Email inboxes still the weakest link in security perimeters
Over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to F-Secure. Types of attacks The single most …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111153/future-400x200.jpg)
What if defenders could see the future? Many clues are out there
Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
How organizations are confronting escalating third-party cyber risk
Based on in-depth interviews with security executives from 30 participating organizations across multiple industries, RiskRecon revealed how companies are managing the …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102504/question-400x200.jpg)
Poor communication between CEOs and technical officers leads to misalignment
A misalignment between CEOs and technical officers is weakening enterprise cybersecurity postures, according to Centrify. CEOs are incorrectly focused on malware, creating …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Even with cloud providers implementing defenses, glaring weaknesses remain
A new report from RedLock offers a look at the threats and vulnerabilities that continue to mount in public cloud computing environments. Account compromises keep rising Poor …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?