![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105929/arrow-400x200.jpg)
Will most security operations transition to the cloud?
Companies across industries are increasingly leveraging the cloud for security applications, with 42 percent indicating they currently run security applications in the cloud …
![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113517/authentication-400x200.jpg)
Online banking customers remain extremely frustrated with passwords
A new survey by iovation and Aite Group, polled nearly 1,100 consumers across four generations who use online and/or mobile banking platforms to better understand their …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
Software development teams embrace DevSecOps automation
Mature development organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale, according to Sonatype. The adoption of DevOps …
![hybrid IT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104712/hybrid-400x200.jpg)
Hybrid IT is becoming a standard enterprise model
Dimension Data research of 1,500 IT decision makers from multiple vertical industries across the US, Europe, Asia-Pacific and South Africa, reveals that hybrid IT is becoming …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105446/risk-400x200.jpg)
Managing third-party risk: Dominant trends
One in five organizations has faced significant risk exposure due to a third party in the last 18 months. Of those who shared loss data, 25% said that the loss impact was …
![password unlock](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113031/password-unlock-400x200.jpg)
Organizations still vulnerable to brute force attacks
While increases in malware are clearly a major threat to both enterprises and service providers, network complexity is creating its own vulnerability, according to Ixia. The …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110041/bot-400x200.jpg)
Bad bots attack 96% of websites with login pages
Almost every website with a login page is under attack from bad bots, the automated programs used to carry out a variety of nefarious activities, according to Distil Networks. …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110851/brain-400x200.jpg)
What impact will artificial intelligence have on business?
Tata Consultancy Services polled 835 executives across 13 global industry sectors in four regions of the world, finding that 84% of companies see the use of AI as …
![tech](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112234/tech-400x200.jpg)
Adoption of advanced technology continues quickly despite security gaps
93% will use sensitive data in an advanced technology (defined as cloud, SaaS, big data, IoT and container) environments this year. 63% of those also believe their …
![woman](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105018/woman-400x200.jpg)
There’s a chronic shortage of women in information security
A survey of over 19,000 cybersecurity professionals has revealed a chronic shortage of women working in the cybersecurity amid a widening skills gap, with women forming just …
![documents](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111709/documents-400x200.jpg)
Securing document flow: Exploring exposure and risk
There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the BPI …
![cybercrime](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105649/cybercrime-400x200.jpg)
Online fraudsters’ preferred tools and techniques revealed
A new report by DataVisor Threat Labs has provided unprecedented insight into the behaviors and attack techniques of some of the world’s largest online crime rings, and …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality