strategy
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
DevSecOps is maturing, 62% of organizations have a team in place
During RSA Conference 2018, Aqua Security surveyed 80 security professionals to gain their unfiltered, high-level perspective on the fast-emerging discipline of DevSecOps. …
![Tyrion](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09100956/tyrion-got-400x200.jpg)
What CISOs can learn from Tyrion on Game of Thrones
Game of Thrones is a gripping, global phenomenon. One of the main reasons for its popularity is its nuanced portrayal of characters who are not 100% good or evil. Over seven …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105446/risk-400x200.jpg)
Quantifying cyber exposure: Attackers are racing ahead
Cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims, potentially siphoning sensitive data, …
![burn](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110748/burn-400x200.jpg)
Security spring cleaning: Tidying up messy firewall rules to reduce complexity
Most security teams are waging a daily battle against complex IT infrastructures, advanced malware and a severe skills shortage – a trifecta that has forced them to tackle …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102947/password-400x200.jpg)
Password pattern analysis: Risky, lazy passwords the norm
Dashlane announced the findings of an analysis of over 61 million passwords. The analysis was conducted with research provided by Dr. Gang Wang, an Assistant Professor in the …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113318/danger-400x200.jpg)
Pressures impacting security pros are up, threats are turning up the heat
Trustwave released the 2018 Security Pressures Report based on a global survey of 1,600 full-time IT professionals who are security decision makers or security influencers …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101014/gdpr-1-400x200.jpg)
It’s time to embrace GDPR
The noise around the General Data Protection Regulation (GDPR) has been unavoidable, and for good reason. GDPR is coming into effect in a few short days (May 25 to be exact). …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
The ethical and legal dilemmas of threat researchers
Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101051/tunnel-400x200.jpg)
Most businesses believe stronger data protection policies will lead to fewer breaches
In light of new data privacy legislations, a new Webroot report looks at how businesses in the U.S., U.K., and Australia are adjusting to new data security measures in order …
![business happy](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101049/business-happy-400x200.jpeg)
Are security pros happy with their jobs and salaries?
Do security professionals like their jobs and would they recommend a career in cyber security to those looking into one? What do they like about their jobs and what motivates …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101108/analyst-400x200.jpg)
Threat analytics: Keeping companies ahead of emerging application threats
Every application that is downloaded via an app store runs in a zero-trust environment. When a protected app is published to an official app store, an open loop of protection …
![Capsule8](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101131/capsule8-400x200.jpg)
How to adopt the mindset of continuous security for security operations
In this podcast recorded at RSA Conference 2018, Dino Dai Zovi, co-founder and CTO at Capsule8, talks about what continuous security is, and how you should bring more of this …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints