![analysis](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101116/analysis-400x200.jpg)
CFO: Disrupting, taking control, and turning data into value
Chief financial officers (CFOs) at banks and insurance companies are playing a growing role in digital transformation by leveraging new data and analytic technologies and by …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105123/person-400x200.jpg)
Consumers can’t shake risky security habits
Despite almost half of U.S. consumers (49 percent) believing their security habits make them vulnerable to information fraud or identity theft, 51 percent admit to reusing …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105805/cloud-400x200.jpg)
Hybrid cloud complexity pushes organizations to look for more security tools
As more organizations embrace hybrid cloud – with more than 50 percent claiming a hybrid cloud setup – and serverless, now used by close to third of organizations, …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
Companies implementing DevSecOps address vulnerabilities faster than others
A new study from CA Veracode includes promising signs that DevSecOps is facilitating better security and efficiency, and provides the industry with the company’s first look at …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095839/email-400x200.jpg)
Most impersonated brands in email attacks? Microsoft and Amazon
Nearly two-thirds of all advanced email attacks used emails impersonating Microsoft or Amazon, according to new research by Agari. Microsoft was impersonated in 36 percent of …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102712/IoT-400x200.jpg)
Most CIOs say IoT will become a major burden
Dynatrace announced the findings of an independent global survey of 800 CIOs, which reveals that 74% of IT leaders are concerned that IoT performance problems could directly …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095907/industry-mirror-400x200.jpg)
Many water and energy systems vulnerable to significant cyber risk
New Trend Micro research revealed how exposed human machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Wider breach awareness fosters more security conversations
Focal Point Data Risk released the second annual Cyber Balance Sheet Report, a closely watched research study using in-depth surveys and interviews of corporate board members …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101705/cloud-400x200.jpg)
Organizations feel ready to put highly sensitive data in the cloud
Many corporate employees are ready to store highly sensitive data in the cloud. However, many are still skeptical of the security posture of their own organizations, according …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104208/IoT-400x200.jpg)
IoT users uncertain if personal data is shared across multiple devices
Most people (64%) say they don’t depend on their connected devices to accomplish daily activities, nearly twice as many as the 36% who indicate they depend on their …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102423/network-400x200.jpg)
Security should be a top priority when transitioning to an SD-WAN solution
Barracuda Networks today released key findings from a new global research report, “Security, Connectivity, and Control: The Challenges and Opportunities of …
![hunt](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103025/soldier-400x200.jpg)
Organizations want to threat hunt, but can’t due to lack of time, skills and visibility
As cybercriminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defenses, organizations must evolve their security …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality