strategy
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
Security budgets shifting from prevention to detection
According to industry estimates, enterprises have historically spent more than 75% of their infosec technology budgets on preventative technologies. According to a new survey …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
Real-time network health management: Closing the gap between known and unknown threats
2016 was yet another record year for cyber security threats. As of July 2016, there were 522 reported breaches, exposing more than 13 million records, according to the …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105545/industry-400x200.jpg)
Effective ICS cyber defense methods
Cyber defense risks are on the top of concern for every manager operating manufacturing and critical infrastructure. The solutions for protecting the Confidentiality, …
![bridge](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112152/bridge-400x200.jpg)
Security management outlook: Five trends to watch
Cybersecurity can’t sit still. As we look ahead to what this year has in store for the security management landscape, organizations globally should be paying attention to five …
![Lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113522/lock-eye-400x200.png)
Global data privacy laws: The #1 cross-border e-discovery challenge
In the year since the EU’s rejection of Safe Harbor, there has been a spike in legal concern over cross-border data transfers, according to a survey by BDO Consulting. Sixty …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110827/lights-400x200.jpg)
Growing risk associated with mobile and IoT application security
Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105947/architecture-400x200.jpg)
Majority of SOCs are below optimal maturity levels
With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112443/hand-400x200.jpg)
82% of executives experienced a fraud incident in the past year
Fraud, cyber, and security incidents are now the “new normal” for companies across the world, according to the executives surveyed for a new Kroll report. The …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
Top cyber concerns plaguing digital enterprises
69% of senior security and IT executives say digital transformation is forcing fundamental changes to existing cybersecurity strategies, according to BMC and Forbes Insights. …
![door](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105503/door-400x200.jpg)
Addressing the challenges of vulnerability coordination
The FIRST Vulnerability Coordination Special Interest Group (SIG) made available for public comment through January 31, 2017 the draft Guidelines and Practices for Multi-party …
![rings](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113023/rings-400x200.jpg)
New security concerns due to business complexities
It is estimated that in 2016, more than $94 billion will be invested in security solutions, per industry analyst forecasts, yet nearly half of organizations report having had …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112826/biohazard-400x200.jpg)
Will 2017 be the year of ransomworm?
It’s safe to say that 2016 was the year of ransomware. More specifically, the year of crypto-ransomware, that nefarious variant that encrypts files and holds them captive …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD