![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110026/healthcare-400x200.jpg)
Connected technologies will accelerate security threats to healthcare industry
Life sciences and healthcare companies will follow the lead of other industries and integrate connected technologies including Internet of Things (IoT) and intelligent …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102649/gears-400x200.jpg)
Top digital transformation challenges? Cybercrime and espionage
In Frost & Sullivan’s recent survey covering end-user perspectives on navigating digital transformation, 54 per cent of IT professionals cited cybercrime and …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102712/IoT-400x200.jpg)
IoT anxiety is consuming security professionals
A new survey conducted by Forrester Consulting unveiled that security and LoB leaders are experiencing high levels of anxiety due to IoT/OT security concerns, largely due to …
![Paper and phone](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110738/paper-phone-400x200.jpg)
1 in 5 IT security pros still use paper to track accounts and passwords
Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening …
![market](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102652/market-400x200.jpg)
Innovation drivers for the global web application firewall market
Web applications are vital technologies used by every online company to communicate with employees, partners, customers, and potential customers. The exposed nature of these …
![broken](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105640/broken-400x200.jpg)
Lack of proper security solutions is annihilating companies’ reputations
Businesses are not meeting consumer expectations around protecting personal information, according to a study conducted by the Ponemon institute across the U.S., U.K., Germany …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102657/gdpr-1-400x200.jpg)
How GDPR affects your organization
The countdown is on and global businesses now have just six months until the General Data Protection Regulation (GDPR) is enforced. A recent study from Trend Micro has found …
![BYOD](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110841/byod-400x200.jpg)
The evolution of BYOD security in a mobile-first world
Bitglass’ research team surveyed 200 IT and security professionals at a national Gartner conference to learn more about the evolution of BYOD security in a mobile-first world. …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102720/gdpr-400x200.jpg)
GDPR to have limited impact on M&A activity
Dealmakers believe that the new General Data Protection Regulation (GDPR) will likely only have a modest impact on M&A activity in the EU, according to a recent survey …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105147/certificate-400x200.jpg)
How much do criminals pay for certificates on the dark web?
The Cyber Security Research Institute (CSRI) conducted a six-month investigation into the sale of digital code signing certificates on the dark web. The research uncovered …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102727/bulb-400x200.jpg)
What makes an intelligent enterprise?
A new global survey by Zebra Technologies analyzes where companies are on the journey to becoming an intelligent enterprise, how they are connecting the physical and digital …
![mobile work](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102737/mobile_work-400x200.jpeg)
The mobile workforce: Productive, but susceptible to data compromise
An enterprise’s biggest problem when it comes to data compromise isn’t just technologies that are vulnerable, it’s how their employees use technology. Digital transformation, …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality