cybersecurity
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09110001/windows-400x200.jpg)
Maintaining Windows 10 security tops list of enterprise challenges
Companies are experiencing significant challenges in their attempts to keep their endpoints secure. Maintaining Windows 10 security topped the list of challenges with over …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103112/businessman-400x200.jpeg)
The evolving nature of the CISO role
As IT security increasingly becomes a priority, CISOs’ influence within companies is growing. However, security strategy in many organizations is still largely reactive and …
![war games](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103132/war_games-400x200.jpg)
The three least effective enterprise security measures
Fifty-nine percent of respondents to a Bitglass survey at Black Hat USA 2017 identified phishing as the best data exfiltration strategy, as human error and ignorance will …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103119/user-400x200.jpg)
Infosec weakest links: Negligent employees and poor password policies
54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach. Password …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104044/abstract-400x200.jpeg)
Digital future: Are we ready for what’s next?
The Internet Society (ISOC), a global non-profit dedicated to ensuring the open development, evolution and use of the Internet, released “Paths to our Digital …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Most cloud services still not GDPR-ready
With the compliance deadline for the GDPR fast approaching in May 2018, a new Netskope report took a close look at GDPR readiness among enterprise cloud services, finding …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103134/bulb-400x200.jpg)
AI will change the face of security, but is it still the stuff of sci-fi?
The technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will …
![threat intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103147/threat_intelligence-400x200.jpg)
Organizations struggle to maximize the value of threat intelligence
Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is “essential …
![user-targeted threats](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103152/user-targeted-threats-400x200.jpg)
User-targeted threats at all-time high despite rising education spend
The cost of security education for large enterprises at an all-time-high of $290,033 per year per organization, and user education is rocketing up the CIO’s priority list. Yet …
![ENISA Cyber Europe](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110218/enisa-cyber_europe-400x200.jpg)
European Commission wants ENISA to introduce EU-wide cybersecurity certification scheme
“Cyber security attacks know no borders and no one is immune,” European Commission President Jean-Claude Juncker noted in his State of the Union Speech on …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
Visual network and file forensics with Rudra
In this podcast recorded at Black Hat USA 2017, Ankur Tyagi, senior malware research engineer at Qualys, talks about visual network and file forensics. Here’s a …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
KPN CISO paints a greater security picture
Being the CISO of such a huge and diverse company as KPN, the Netherlands’ largest telecom and ISP provider, requires great determination, and the current holder of the …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints