strategy
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110241/cloud-400x200.jpg)
Top cloud challenges: Security, compliance, and cost control
A new Fugue survey, fielded to over 300 IT operations professionals, executives, and developers, found that most respondents believe that the cloud is not living up to …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
What makes a good security analyst: The character traits you need
Of all the skillsets IT decision-makers are looking to hire for, cybersecurity is easily the most challenging. According to Global Knowledge’s 10th annual IT Skills and Salary …
![scalable](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103833/scalable-400x200.jpg)
Making enterprise content management secure and scalable
Content is one of the most valuable commodities that any business owns. It’s the key driver of customer interactions, the foundation of core business processes, and it helps …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
With ransomware, pay up if you want to keep paying
A hospital CEO is contacted in the middle of the night with a dire warning. Hackers have taken control of computer systems used for patient care, CT scans, and lab work. The …
![city](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110636/city-400x200.jpg)
Most businesses will not put off cloud adoption because of security concerns
Businesses are pressing ahead with their digital transformation plans, despite fears of being hit by a cyber attack or data protection regulations. This is according to a new …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103906/lock-400x200.jpg)
Businesses finally realize that cyber defenses must evolve
Cybersecurity is finally getting the attention it deserves – it is only regrettable that this good news is the result of bad news: more numerous, complex, and damaging …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105149/idea-400x200.jpg)
Fostering a safe place for businesses to work in
It’s no secret that in the past few years, business leaders have begun to realise the potential of digital transformation to give their organisation a competitive edge. …
![Businessman juggling](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195417/problems-400x200.jpg)
When it comes to cybersecurity, businesses remain overconfident and vulnerable
Consumer products companies, retailers and restaurant businesses may be operating with a false sense of security, according to a new Deloitte study. The study captures input …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105236/money-400x200.jpeg)
Average data breach cost declines 10% globally
The average cost of a data breach is $3.62 million globally, a 10 percent decline from 2016 results. This is the first time since the global study was created that there has …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194518/brain-400x200.jpg)
AI can increase corporate profitability by average of 38% by 2035
Businesses that successfully apply artificial intelligence (AI) could increase profitability by an average of 38 percent by 2035, according to Accenture. The introduction of …
![Business](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103916/business-man_woman-400x200.jpeg)
Security startup confessions: Attending industry events
My name is Kai Roer and I am a co-founder of European security startup CLTRe, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
![center](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113443/center-400x200.jpg)
Evaluating artificial intelligence and machine learning-based systems for cyber security
All indicators suggest that 2017 is shaping up to be the year of artificial intelligence and machine learning technology for cyber security. As with most trends in our …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)