strategy
![Healthcare IoT](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093856/heathcare-iot-400x200.jpg)
The challenges of cyber research and vulnerability disclosure for connected healthcare devices
As Head of Research at CyberMDX, Elad Luz gathers and analyzes information on a variety of connected healthcare devices in order to improve the techniques used to protect them …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
Three API security risks in the wake of the Facebook breach
Facebook recently pledged to improve its security following a lawsuit that resulted from a 2018 data breach. The breach, which was left open for more than 20 months, resulted …
![innovation](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093753/innovation-400x200.jpg)
Take your SOC to the next level of effectiveness
Enterprise security infrastructures average 80 security products, creating security sprawl and a big management challenge for SOC teams. With high volumes of data generated …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
SecOps teams face challenges in understanding how security tools work
Security professionals are overconfident in their tools with 50% reporting that they have experienced a security breach because one or more of their security products was not …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103134/bulb-400x200.jpg)
Key technology trends that will redefine businesses over the next three years
To compete and succeed in a world where digital is everywhere, companies need a new focus on balancing “value” with “values,” aligning their drive to create business value …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093146/robot-400x200.jpg)
Security pros anticipate automation will reduce IT security headcount, but not replace human expertise
The majority of companies (77 percent) continue to use or plan to use automation in the next three years, according to a Ponemon Institute and DomainTools survey. The biggest …
![climb](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100634/climb-400x200.jpg)
Cybersecurity is a board level issue: 3 CISOs tell why
As a venture capital investor who was previously a Chief Information Security Officer, I have noticed an interesting phenomenon: although cybersecurity makes the news often …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/10120129/people-400x200.jpg)
Organizations struggling to find skilled security staff, leaving 82% of security teams understaffed
83% of IT security professionals feel more overworked going into 2020 than they were at the beginning of 2019, and 82% said their teams were understaffed, according to a …
![People](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/07132926/people_work-400x200.jpg)
5 tips for acquiring cyber talent in 2020
Cybersecurity is facing a recruitment crisis. There are currently 2.8 million professionals working in the field – far from sufficient given the ever-expanding cyber threat …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
What the government infosec landscape will look this year
The information security landscape seems to evolve at a faster clip each year. The deluge of ever-changing threats, attack techniques and new breaches making headlines can be …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/09173929/network-blue-400x200.jpg)
The future of DNS security: From extremes to a new equilibrium
In anticipation of his keynote at HITB Security Conference 2020 in Amsterdam, we talked to internet pioneer Dr. Paul Vixie, Farsight Security Chairman and CEO. Dr. Vixie was …
![Cyber Minds](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/05095212/review-cyber_minds-400x200.jpg)
Review: Cyber Minds
Humans are an essential part of any enterprise and should be considered the foundation of its cybersecurity. That’s probably easier said than done, but Shira Rubinoff has some …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?