![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110026/healthcare-400x200.jpg)
Is healthcare industry’s security spending focused on the wrong technologies?
Global healthcare IT professionals are confronting a rapidly changing, challenging landscape, with 66% experiencing a data breach and 88% feeling vulnerable as a result. In …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Public cloud services spending to reach $122.5 billion in 2017
Worldwide spending on public cloud services and infrastructure will reach $122.5 billion in 2017, an increase of 24.4% over 2016. Over the 2015-2020 forecast period, overall …
![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113757/business-400x200.jpg)
Half of IT pros lack confidence in their company’s cybersecurity strategies
Centrify asked IT professionals attending RSA Conference 2017 how their companies secure applications and infrastructure in the age of access, and their responses revealed …
![encryption data](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09113952/encryptiondata-400x200.jpg)
Global geopolitical changes driving encryption adoption
Recent global geopolitical changes have made more people and organizations than ever worry about the privacy of their data, and consider increasing their use of encryption to …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112438/usa-flag-400x200.jpg)
Americans increasingly worry about online privacy and security
Americans are increasingly concerned about their online privacy and security, and apprehensive about increased government surveillance in the new presidential administration, …
![attack](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111903/attack-400x200.jpg)
Attack types companies expect to encounter in 2017
What are the key attack types expected to cause the biggest security problems in 2017 and how successful will businesses be at defending against them? Tripwire and Dimensional …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111052/people-400x200.jpg)
U.S. consumers’ views on cybersecurity
To better understand how Americans think about hacker motivations, consumer versus business security responsibilities, ransomware and the political climates impact on the …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105628/IoT-400x200.jpg)
Security programs not keeping up with IoT threats
More than 90 percent of IT security professionals said that connected devices will be a major security issue this year. However, 66% aren’t sure how many devices are in their …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Top phishing targets in 2016? Google, Yahoo, and Apple
For every new phishing URL impersonating a financial institution, there were more than seven impersonating technology companies. Comparison of most impersonated companies …
![sidelines infosec professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113754/sidelines-400x200.jpg)
Tips on how to address the growing cyber security skills gap
Sophisticated cyber security defenses are increasingly in high demand as a cyber security attack is now viewed as an inevitability. However, a majority of surveyed …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111933/ddos-1-400x200.jpg)
DDoS attacks increasingly form blended attacks of more vulnerabilities
DDoS attacks increasingly formed blended attacks of four or more vulnerabilities over the course of the fourth quarter of 2016, with an intent to overload targeted monitoring, …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
Security practices need to evolve in order to handle complex threats
There is no one-size-fits-all security solution to address the threat landscape today’s businesses face. Each organization has unique security obstacles and obligations. …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality