strategy
![road sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111958/road_sign-400x200.jpg)
Most IT decision makers don’t trust data, but 54% still use it to make decisions
77% of IT decision makers (ITDMs) don’t completely trust the data within their organization for timely and accurate decision making, according to SnapLogic. With 98% of those …
![cyber insurance](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08133531/cyber_insurance-yellow-400x200.jpg)
How do I select cyber insurance for my business?
There has been a 70%+ increase in the average cost of a cybercrime to an organization over five years to $13mn and a 60%+ increase in the average number of security breaches, …
![Kali Linux](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08102405/kali_linux1-400x200.jpg)
How Kali Linux creators plan to handle the future of penetration testing
Offensive Security might best known as the company behind Kali Linux, the popular (and free) open-source pen testing platform, but its contribution to the information security …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101639/connection-400x200.jpg)
Industrial pros looking for a more focused approach to digital transformation
A highly focused approach to digital transformation is challenging the traditional top-down, all-or-nothing strategy, according to a report from Plutoshift. The findings …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Rising physical threats putting leaders under pressure
Physical threats are rising and increasingly unmanageable, putting unprecedented financial, reputational and liability pressures on business leadership and security teams, …
![reload](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102722/reload-400x200.jpg)
Achieving digital transformation by overcoming identity fatigue
Conversations about digital transformation (DX) are so frequent and pervasive that we tend to lose track of how incomplete they can be. You might think that DX only concerns …
![Shark](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/27103738/shark-vuln-400x200.jpg)
Key cybersecurity problems expected to mark 2021
After a year in which COVID-19 upended the way we live, work and socialize, we are likely to see an increased threat from ransomware and fileless malware in 2021, according to …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
Trends every IT leader needs to know to empower the enterprise
Only 37% of organizations definitely have the skills and technology to keep pace with digital projects during the COVID-19 pandemic, a MuleSoft survey reveals. Access to data …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093955/patch2-400x200.jpg)
December 2020 Patch Tuesday forecast: Always consider the risk
The final Patch Tuesday of the year is upon us and what a year it has been. Forcing many changes this year, the pandemic has impacted the way we conduct both security and IT …
![SASE](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/02084438/sase-400x200.jpg)
How to take SASE from a buzzword to a plan
Whether you are talking to your leadership or external auditors, it’s always best to be able to explain that your cybersecurity program is based on a framework utilizing …
![find](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094457/find-400x200.jpg)
Raising defenses against ransomware in healthcare
More than half a decade has passed since ransomware-wielding attackers started focusing on healthcare providers. Despite some initial misgivings about targeting life-saving …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/20075020/risk-hand-400x200.jpg)
The three stages of security risk reprioritization
What began as a two-week remote working environment, due to COVID-19 has now stretched past the nine-month mark for many. The impact of telework on organizations can be felt …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history