strategy
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
The privacy and security trends that will shape 2020
Privacy concerns will ratchet up further around IoT and 5G. Even if the industry manages to secure the billions of IoT devices already deployed, they permeate so many aspects …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092940/aid1-400x200.jpg)
The importance of proactive patch management
IT teams appreciate it when vendors or security researchers discover new vulnerabilities and develop patches for them. So do attackers. The same information that lets IT teams …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094642/building-400x200.jpg)
2020 is prime for a global building cybersecurity standard
Buildings will account for 81% of all connected things in 2020, ushering in a new era of smart office buildings, schools, hospitals and more that will improve efficiencies for …
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092731/microsoft-active-directory-400x200.jpg)
Active Directory password reset best practices
Password change and password reset are terms that are often used interchangeably. However, they are not the same. A user will perform a password change when they remember …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092933/insider_threat-1-400x200.jpg)
How to test employee cyber competence through pentesting
Social engineering hacking preys on the vulnerabilities inherent in human psychology. Take the Nigerian (419) scams as an example: the scammer tries to convince the victim to …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
The 7 most dangerous digital technology trends
As our world embraces a digital transformation, innovative technologies bring greater opportunities, cost efficiencies, abilities to scale globally, and entirely new service …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105157/hand-400x200.jpeg)
It’s the most vulnerable time of the year
With the holiday season upon us, it can be all too easy to get swept up in the festivities. As soon as the Halloween hangover starts to finally wear off, you’re already …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094026/eye-400x200.jpg)
Top 5 cybersecurity predictions for 2020
When it comes to cybersecurity, staying ahead of threats – rather than reacting to them – is critical. In a constantly evolving threat landscape, plugging holes – or designing …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
DNS over HTTPS’ threat to enterprise security
DNS over HTTPS (DoH) is here, regardless who likes it or not. Unfortunately, a majority of guidance surrounding DoH is centered around individual consumer perspectives. For …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
Avoiding the next breach: Four tips for securing your apps
As security incidents continue to be an ongoing threat to businesses on a daily basis, keeping security procedures up-to-date and avoiding the next breach have become …
![Earth](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/04132742/earth-space-400x200.jpg)
2020 predictions: Rising complexity of managing digital risk
Digital risk management experts at RSA Security have released their predictions for 2020, detailing key cyber trends for the year ahead. With contributions from President, …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112340/lock-400x200.jpg)
How do SMBs plan to improve their security posture in 2020?
With cybersecurity concerns already mounting ahead of the 2020 presidential election, SMB executives are turning their attention to how these threats could impact their own …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?