security spending
![Law legislation](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113340/law-400x200.jpg)
Law firms are increasingly investing in cybersecurity programs
Logicforce released the results of its most recent Law Firm Cybersecurity Scorecard, a periodic study designed to assess cybersecurity preparedness across the legal industry …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
What mid-market security budgets will look like in 2019
As 2018 draws to a close, IT and security pros around the country will greet the arrival of budget season with a collective sigh. Negotiating for IT budgets at small or …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194554/money-400x200.jpg)
Closing the security gap will drive $125 billion critical infrastructure security spending
Critical infrastructures are radically transforming on an unprecedented scale, boosted by a rapid adoption of ‘smart’ operational technologies. Cybersecurity is a growing part …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095805/connection-400x200.jpg)
Five key considerations when developing a Security Operations Center
Ensuring access to a reliable feed of threat intelligence through a security operations center (SOC) is an essential element of many organization’s security strategy today. …
![finance](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095930/finance-400x200.jpg)
How to make the CFO your best cybersecurity friend
I’m bad dinner company. As the CFO of a cloud technology provider, I like to speak about finance and cybersecurity, two topics entirely capable of putting my dinner guests to …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
Security budgets are rising, but is it enough?
A majority of companies (54 percent) are worried that they will soon outgrow their security solutions, according to Threat Stack. While budgets are expected to increase by 19 …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095949/tunnel-400x200.jpg)
9 in 10 organizations have a cybersecurity culture gap
With cybersecurity threats continuing to escalate worldwide, the ISACA/CMMI Institute Cybersecurity Culture Report found that just 5 percent of employees think their …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
Your backup data sets can become a treasure trove for advanced threat detection
Despite ever increasing investments in security technologies, data breaches and cyber incidents are increasing at a relentless rate, and the problem is projected to keep …
![stats](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102247/stats-400x200.jpeg)
Global spending on security solutions to reach $133.7 billion in 2022
Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to IDC. Although spending growth is expected to …
![future](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105715/future-400x200.jpg)
Emerging technologies lag in criticality while key skills remain a barrier
TEKsystems released the results of its 2018 Forecast Reality Check. The survey is designed to measure the current impact of market conditions on IT initiatives, hiring, …
![cloud storage](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102525/cloud_storage-400x200.jpg)
Worldwide spending on cloud IT infrastructure continues to grow, reaches $15.4 billion
According to the IDC Worldwide Quarterly Cloud IT Infrastructure Tracker, vendor revenue from sales of infrastructure products (server, enterprise storage, and Ethernet …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
Organizations need to shift strategies, adopt a proactive approach to cybersecurity
The cybersecurity market has reached a point whereby organisations need to shift their strategies and have a new, proactive approach to their cybersecurity, according to a …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders