strategy
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102449/puzzle-400x200.jpg)
How to combat delivery ramifications after a data breach
Following Marriott’s data breach, FTC regulations required the hotel chain to reach out to its entire email list of customers, informing them of a potential leak of their …
![collaboration](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111540/collaboration-400x200.jpg)
The risks associated with the influx of unauthorized collaboration tools
A majority (82 percent) of end-users are pushing back on IT or management when the company tries to dictate which collaboration tools should be used. But IT is standing its …
![analyze](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095209/analyze-400x200.jpg)
CISO’s guide to an effective post-incident board report
A successful cyberattack is undoubtedly one of the most disruptive events an organization can experience. Whether it’s phishing, DDoS, ransomware or SQL injection, the …
![shadow](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194957/shadow-400x200.jpg)
Prevent shadow IT: Companies need security covering multiple communication vectors
There is a critical need for companies to adopt comprehensive and secure enterprise communications platforms to prevent shadow IT. It is a phenomenon where employees, to …
![thief](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095826/thief-400x200.jpg)
Insights on modern adversaries and their tactics, techniques, and procedures
In today’s ever-evolving cyber landscape, speed is essential for effective cyber defense. CrowdStrike’s Global Threat Report reveals “breakout time” – the critical window …
![NGINX](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095223/nginx-400x200.jpg)
Building security into cloud native apps with NGINX
Companies like Airbnb, Uber and DoorDash, which have a cloud-based software infrastructure as one of their main enablers, are disrupting the hospitality, transportation and …
![Password](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095338/password_field-400x200.jpg)
Indicators of poor password hygiene exposed
The recovered compromised credentials and personally identifiable information (PII) as well as the identified trends in online security habits and the data criminals tend to …
![programmer](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110033/programmer-400x200.jpeg)
Three reasons employee monitoring software is making a comeback
Companies are increasingly implementing employee and user activity monitoring software to: Ensure data privacy Protect intellectual property and sensitive data from falling …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
Machine learning fundamentals: What cybersecurity professionals need to know
In this Help Net Security podcast, Chris Morales, Head of Security Analytics at Vectra, talks about machine learning fundamentals, and illustrates what cybersecurity …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100716/hand-400x200.jpg)
Increased appetite for biometrics fueled by speed, security and convenience
The Biometric Consumer Sentiment Survey of more than 1,000 U.S. adults who have experience using biometrics to log into their accounts, reveals an increased appetite for the …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102504/question-400x200.jpg)
SMBs spending a day each week dealing with cybersecurity issues
Almost half of UK small to medium-sized businesses (SMBs) believe a cyberattack would put their business at risk of closure, and 48 per cent of businesses report they have had …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
Nearly two-thirds of organizations say tech skills gap is impacting IT audits
Technologies such as AI are reshaping the future of IT auditors, but auditors are largely optimistic about the future, according to new research from ISACA. In the Future of …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?