![email](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104620/email-400x200.jpg)
Rollout of DMARC email security protocol needs to gain steam
Trust, from both customers and investors, is the most important currency for financial services companies. A breach of trust can break a bank, while maintaining trust leads to …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105149/idea-400x200.jpg)
The rise of InsurTech: How young startups influence a mature industry
Artificial intelligence (AI) and the Internet of Things (IoT) now account for almost half of total investment in insurance technology (InsurTech) startups globally, according …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
People are still the biggest security threat to any organization
Despite an increase in spending and investment in deterrence tactics and detection tools, insider threats continue to cause harm to all types of organizations. A new report …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
Number of compromised records up 566% in 2016
The number of records compromised grew a historic 566 percent in 2016 from 600 million to more than 4 billion. These leaked records include data cybercriminals have …
![Desk](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112959/desk_type-400x200.jpg)
How CIOs are shaping the future of work
IT leaders are poised to make radical changes in the workplace, but boardrooms are holding back progress by continuing to place too much emphasis on reducing costs and keeping …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195244/eye-400x200.jpg)
1.37 billion data records compromised globally in 2016
Gemalto’s Breach Level Index revealed that 1,792 data breaches led to 1.37 billion data records being compromised worldwide during 2016, an increase of 86% compared to …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195157/user-400x200.jpg)
Understanding Europe’s insider threats
35% of employees across the UK, France, Germany and Italy admit to have been involved in a security breach, presenting regional CISOs with a significant challenge when it …
![emergency](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110645/emergency-400x200.jpg)
IT pros spend too much time handling emergencies
A 1E survey of 1,014 IT professionals, who together manage more than 21 million endpoints globally, centered on unplanned activities – how often they occur, what types are …
![hard drive](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112219/harddrive-400x200.jpg)
Used devices are a treasure trove of personally identifiable information
40 percent of hard drives, mobile phones and tablets resold in publicly-available resale channels contain personally identifiable information (PII), according to an analysis …
![smartphone](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105531/smartphone-400x200.jpg)
Lack of security patching leaves mobile users exposed
An analysis of the patch updates among the five leading wireless carriers in the United States found that 71 percent of mobile devices still run on security patches more than …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194215/healthcare-400x200.jpg)
Healthcare IT pros believe data is safer in the cloud
Healthcare IT professionals and executives believe overwhelmingly that when facing hardware malfunctions and environmental disasters, their organization’s data is safer …
![PC](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104657/pc-400x200.jpg)
Java and Flash top list of most outdated programs on users’ PCs
52% of the most popular PC applications, including Flash and Java, are out-of-date. People are exposing their PC and their personal data to risks, as malware targets older …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality