![phone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194408/phone-400x200.jpg)
Mobile data protection market to reach $13.999 billion by 2026
The mobile data protection market is evaluated at $1.949 billion for the year 2019 and is projected to grow at a CAGR of 32.53% to reach a market size of $13.999 billion by …
![ukraine attacks](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/10133417/ukraine-attacks-400x200.jpg)
War in Ukraine: What type of cyber attacks can we expect next?
The cyber activities related to the ongoing war in Ukraine have run the gamut from wiper malware hitting organizations and the border control in Ukraine, DDoS attacks aimed at …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
Does the future of digital identity offer us greater security and convenient experiences?
Much of the promise associated with future digital identity infrastructures is associated with greater automation of the identity lifecycle and the provision of greater …
![captcha](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095602/captcha-400x200.jpg)
Why are CAPTCHAs still used?
The success of your online business hinges on your customers’ ability to properly recognize crosswalks or traffic lights. I’m, of course, referring to CAPTCHAs, the online …
![endpoint protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/23100505/endpoint-protection-400x200.jpg)
ITOps teams are getting buried beneath too many disparate solutions for endpoint management
Automox released the findings of a report which revealed that keeping endpoints continuously updated and secure has become even more challenging since the Automox 2021 report, …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093955/patch2-400x200.jpg)
Organizations taking nearly two months to remediate critical risk vulnerabilities
Edgescan announces the findings of a report which offers a comprehensive view of the state of vulnerability management globally. This year’s report takes a more granular …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/05112959/password-code-400x200.jpg)
Organizations need to change their current password usage and policies, and do it fast
Password-related attacks are on the rise. Stolen user credentials including name, email and password were the most common root cause of breaches in 2021 with several …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112845/person-400x200.jpg)
Businesses under pressure as consumers exercise their privacy rights
DataGrail unveiled the results of its research report that looks at consumer data privacy trends. In the report, the company benchmarked the cost, volume, and challenges …
![Kids online](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/04142620/pexels-julia-m-cameron-4145355-400x200.jpg)
Still too many parents don’t monitor their children’s online activity
Pixalate announced the results of a Harris Poll survey examining American parents’ views about about online privacy concerning their children. The survey found that 48% …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184920/biometrics1-400x200.jpg)
Facial recognition market to reach $12.67 billion by 2028
The facial recognition market size is projected to reach $12.67 billion by 2028 from $5.01 billion in 2021, growing at a CAGR of 14.2% from 2021 to 2028, according to the …
![Privacy Shield](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114002/privacy-shield-item-400x200.jpg)
Data privacy laws are an opportunity to become more honest in reaching your target audience
Data privacy regulations are designed to give consumers more transparency into and control over how their data is collected, shared and used, especially as more consumers grow …
![Department of Defense](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100410/dod-400x200.jpg)
Understanding US Defense Department’s relaxed cybersecurity protocols under CMMC 2.0
Department of Defense (DoD) contractors struggling to comply with upcoming cybersecurity regulations under the Cybersecurity Maturity Model Certification (CMMC) can breathe a …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality