strategy
![EU flag](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195648/EU-flag-400x200.jpg)
Businesses still confused about GDPR
European businesses are still unsure about GDPR – almost 78% of IT decision makers at more than 700 European companies either lacked understanding about the impact of …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104953/data-400x200.jpg)
Not all threat intelligence is created equal
In this podcast recorded at RSA Conference 2017, John Czupak, CEO at ThreatQuotient, and Jonathan Couch, Senior VP of Strategy at ThreatQuotient, talk about what’s important …
![arrow](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112324/arrow2-400x200.jpg)
Addressing pain points in governance, risk and compliance
In this day and age, it seems as though every business has some form of alphabet soup or acronym salad that shapes the decisions they make as it pertains to their information …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105020/hands-400x200.jpg)
How people-based actions put critical data at risk
While 80 percent of respondents believe it’s important to understand the behaviors of people as they interact with intellectual property and other critical business …
![iovation authentication](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105026/iovation-authentication-400x200.jpg)
How a dynamic range of authentication can open doors for trusted customers
In this podcast recorded at RSA Conference 2017, Michael Thelander, Director of Product Marketing at iovation, talks about lessons learned from bringing authentication …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110026/healthcare-400x200.jpg)
Is healthcare industry’s security spending focused on the wrong technologies?
Global healthcare IT professionals are confronting a rapidly changing, challenging landscape, with 66% experiencing a data breach and 88% feeling vulnerable as a result. In …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Public cloud services spending to reach $122.5 billion in 2017
Worldwide spending on public cloud services and infrastructure will reach $122.5 billion in 2017, an increase of 24.4% over 2016. Over the 2015-2020 forecast period, overall …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
Intel Security’s strategy for eliminating cybersecurity fragmentation
At RSA Conference 2017, Intel Security outlined a new, unifying approach for the cybersecurity industry that strives to eliminate fragmentation. The workforce shortage facing …
![sidelines infosec professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113754/sidelines-400x200.jpg)
Tips on how to address the growing cyber security skills gap
Sophisticated cyber security defenses are increasingly in high demand as a cyber security attack is now viewed as an inevitability. However, a majority of surveyed …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
Security skills gap? What security skills gap?
After the year we’ve had, it shouldn’t come as a surprise that cybersecurity skills are heavily in demand. Breaches, attacks and incidents have never been far from the …
![fence](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105100/fence-400x200.jpeg)
Five ways to prevent data leaks
The story still strikes fear into the hearts of IT departments: As many as 70 million credit- and debit card accounts were compromised in less than a month during the Target …
![User](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195548/entrepreneur-696976_1280-400x200.png)
Six critical customer support differentiators in cybersecurity
Regardless of size or sector, excellent customer support is a major differentiator within any organization. In the cybersecurity industry, however, tech support is more than a …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD