![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093232/shield1-400x200.jpg)
Better cybersecurity hinges on understanding actual risks and addressing the right problems
SANS Technology Institute’s Internet Storm Center (ISC) has been a valuable warning service and source of critical cyber threat information to internet users, …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100605/healthcare-400x200.jpg)
Business efficiency metrics are more important than detection metrics
With cyberattacks on the rise, today’s security professionals are relying primarily on detection metrics – both key performance indicators (KPIs) and key risk indicators …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103433/architecture-400x200.jpg)
Data exfiltration: The art of distancing
We have all seen the carefully prepared statement. A cyber incident has occurred, we are investigating but please do not worry since no data has left our network. Perhaps we …
![application](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27101818/application-blue-400x200.jpg)
Cybersecurity software sales and training in a no-touch world
The pandemic has led to an outbreak of cybercriminal activity focused on remote workers and enterprises that needed to quickly migrate to the cloud to maintain business …
![icosahedral](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103458/icosahedral-400x200.jpg)
How data science delivers value in a post-pandemic world
With businesses from various industries tightening their belt due to pandemic-induced economic challenges, investing in data science applications and building out their teams …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102610/gdpr-3-400x200.jpg)
Does analyzing employee emails run afoul of the GDPR?
A desire to remain compliant with the European Union’s General Data Protection Regulation (GDPR) and other privacy laws has made HR leaders wary of any new technology that …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093814/user-400x200.jpg)
How to establish a threat intelligence program
Instituting an in-house cyber threat intelligence (CTI) program as part of the larger cybersecurity efforts can bring about many positive outcomes: The organization may …
![mobile security](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18175826/mobile_security-device-400x200.jpg)
How do I select a mobile security solution for my business?
The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the security …
![security awareness](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18071416/sec-awareness-400x200.jpg)
How do I select a security awareness solution for my business?
“Great security awareness training, that is part of a healthy cyber security culture and that is aimed at encouraging positive security behaviours, is essential. The …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103023/target-400x200.jpg)
Cybercriminals banking on finance: Mitigating escalation
When it comes to cyber attacks, no industry is safe. But according to Boston Consulting Group research, financial service firms experience up to 300 times as many cyber …
![work from home](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/28085110/wfh-desk-400x200.jpg)
Work from home, work from anywhere: Are you secure everywhere?
As millions of employees continue to work from home for the foreseeable future and in some cases perhaps indefinitely, balancing the ongoing demands of employee productivity …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094211/lock-400x200.jpg)
A look inside privacy enhancing technologies
There is a growing global recognition of the value of data and the importance of prioritizing data privacy and security as critical cornerstones of business operations. While …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints