strategy
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095247/zero-400x200.jpg)
Preventing insider threats, data loss and damage through zero trust
With the proliferation of mobile devices and BYOD, ubiquitous and always available internet connectivity and the widespread use of private, public and hybrid cloud solutions, …
![IoT connection](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104554/iot-connection-400x200.jpg)
Create secure IoT products: Enable security by design
Good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime have been introduced …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
California IoT security law: What it means and why it matters
In September, California Governor Jerry Brown signed into law a new bill aimed at regulating the security of IoT devices, and it’s set to go into effect in a few short months …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
Only 11% of organizations can detect intruders in under one minute
The process of detecting, triaging, investigating, and containing a cyber incident takes organizations globally on average nearly seven days of working around the clock …
![virtual reality](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112824/virtual_reality-400x200.jpg)
Want to build a successful SOC? Here’s what you need to know
There is no arguing the fact that networks are continually growing in complexity and the cyberattack surface is constantly expanding. A critical step in building a stronger …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095955/cloud-tech-400x200.jpg)
IT professionals deem hybrid cloud as most secure
Enterprises plan to aggressively shift investment to hybrid cloud architectures, with respondents reporting steady and substantial hybrid deployment plans over the next five …
![automate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101757/automate-400x200.jpg)
Automated systems: Flag smarter, not everything
Imagine dealing with 1,000s of security alerts a day, whilst simultaneously juggling the tasks that are part of your day-to-day job. Challenging right? This is the current …
![World](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/12192712/world-lines-red-400x200.jpg)
Enterprise cybersecurity in the Asia-Pacific region
Almost one in five business organizations in the Asia-Pacific (APAC) region experienced more than six security breaches in the past two years, a new ESET enterprise …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101202/business-400x200.jpeg)
The leading challenge facing cloud migration projects is security
60% of organizations misunderstand the shared responsibility model for cloud security and incorrectly believe the cloud provider is responsible for securing privileged access, …
![BEC scams](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103857/bec_scams-400x200.jpg)
Your supplier’s BEC problem is your BEC problem
Business email compromise (BEC) scams are a burgeoning threat for organizations and, despite rising awareness, new victims are cropping up daily. BEC scammers don’t care …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/11111202/lock-400x200.jpg)
The password reuse problem is a ticking time bomb
Despite Bill Gates predicting the demise of passwords back in 2004, they are still very much in use. Passwords, like email, seem future proof; but they are also the source of …
![geometry](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094019/geometry-400x200.jpg)
When is the right time to red team?
“It takes a thief to catch a thief.” Despite being hundreds of years old, this idiom holds perfectly true for that most modern of thieves, the cybercriminal. With …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?