![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104053/person-400x200.jpg)
Cybercrime gangs continue to innovate to hide their crimes
According to the APWG’s new Phishing Activity Trends Report, after spiking in the spring, phishing has been taking place at a steady pace — but phishers are using new …
![see](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100214/see-400x200.jpg)
Most concerning security controls for cyberattackers? Deception and IDS
Attivo Networks surveyed more than 450 cybersecurity professionals and executives globally to gain insights into detection trends, top threat concerns, attack surface …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113133/bomb-400x200.jpg)
Most organizations suffered a business-disrupting cyber event
A study conducted by Ponemon Institute found that 60 percent of organizations globally had suffered two or more business-disrupting cyber events — defined as cyber attacks …
![programming](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095527/programming-400x200.jpg)
How students learn to code, evaluate job opportunities
New data from HackerRank reveals the technical skills, learning preferences and career motivators of collegiate software engineers. The findings provide a playbook for …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Hacking democracy efforts continue with upticks in malware deployments
Comodo Cybersecurity released its Global Threat Report 2018 Q3, offering insights from Comodo Threat Research Lab experts into key cyberthreat trends and the impact of malware …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101457/biohazard-400x200.jpg)
Will sophisticated attacks dominate in 2019?
Trend Micro released its 2019 predictions report, warning that attackers will increase the effectiveness of proven attack methods by adding more sophisticated elements to take …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105222/tools-400x200.jpg)
An integrated approach helps companies improve operational resilience
By taking a unified approach to managing critical events (i.e. extreme weather, violence, supply chain disruption), businesses can significantly reduce the impact on employee …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102804/hands-400x200.jpg)
Consumers still put trust in big brands despite breaches
Janrain conducted a survey to better understand how consumers really feel about brands in the wake of so many breaches. The company polled 1,000 UK adults and found that most …
![measure](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103540/measure-400x200.jpeg)
Measuring privacy operations: Use of technology on the rise
Critical privacy program activities such as creating data inventories, conducting data protection impact assessments (DPIA), and managing data subject access rights requests …
![social media](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100852/socialmedia-400x200.jpeg)
Consumers believe social media sites pose greatest risk to data
A majority of consumers are willing to walk away from businesses entirely if they suffer a data breach, with retailers most at risk, according to Gemalto. Two-thirds (66%) are …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095605/connection-400x200.jpg)
Microservices becoming architectural style of choice for application development
Microservices – a software development technique where an application is created by combining numerous smaller services – have evolved from fad to trend, becoming …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112242/abstract-400x200.jpg)
80% of enterprises struggle to protect machine identities
A study conducted by Forrester Consulting examined the views of 116 IT security professionals from financial services and insurance organizations in the U.S., U.K., Germany, …