Expert analysis
![locks](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111109/locks-400x200.jpg)
Four critical KPIs for securing your IT environment
In 2018, the average cost of a data breach is more than $3.75 million, and experts expect this number to rise in the coming years. This staggering—and potentially …
![storm](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104322/storm-400x200.jpeg)
Keeping your cloud malware-free: What you need to know
This year we’ve seen massive malware attacks spanning from nation state campaigns originating in North Korea and Russia to popular restaurants and everything in between. Each …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100033/industrial-400x200.jpg)
Safe IT/OT integration with unidirectional security gateways
The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of …
![Windows 10 patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101654/windows_10-patch-400x200.jpg)
Heading into October Patch Tuesday on the heels of big announcements from Microsoft
October is here and Patch Tuesday is next week, followed quickly by Halloween. Don’t be scared (unless you are a Facebook user)! The winds of change are blowing this fall …
![light](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100048/light-400x200.jpg)
Bridging the priority gap between IT and security in DevOps
Let’s start with a test. Suppose that you manage a corporate network gateway across which a critical programmed transaction is scheduled to occur in exactly one hour. Suppose …
![fight](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103648/fight-400x200.jpg)
You gotta fight, for your right, to erasure
According to Article 17 of the European Union’s General Data Protection Regulation (GDPR), all personal data that is no longer necessary must be removed and deleted. This …
![lightbulb](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100102/lightbulb-2824864-400x200.png)
It only takes one data point to blow open a threat investigation
Because cybersecurity has been such a pain point for businesses, it’s easy to assume that threat investigations are difficult and unwieldy to manage. When you consider what’s …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100109/industrial-400x200.jpg)
Vulnerabilities and architectural considerations in industrial control systems
The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
You should prepare for the next mega data breach
As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105020/hands-400x200.jpg)
Cybersecurity has a diversity problem: Here’s why
I’ve gotten really good at listing really depressing and disheartening stats over the years. It’s not what I want to be good at, but I’ve found that it’s necessary to help …
![complex](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100143/complex-1-400x200.jpg)
Are you ready? A good incident response plan can protect your organization
The rise in cyber threats in the last several years has shown that organizations must continuously stay ahead of adversaries to protect their investments: data, intellectual …
![CUJO AI](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100135/CUJO_AI_08_28_02-400x200.jpg)
Smart homes, dumb devices: Making the IoT safe
The Internet of Things is growing by the second. Gartner predicts that by 2020, there will be 20.4 billion connected devices worldwide. Unfortunately, this vast network …
Featured news
Sponsored
Don't miss
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality
- FIN7 sells improved EDR killer tool
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)