Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
work
Understaffing persistently impacting enterprise privacy teams

A research from ISACA explores the latest trends in enterprise privacy — from privacy workforce and privacy by design to privacy challenges and the future of privacy. The …

Microsoft 365
Organizations neglecting Microsoft 365 cybersecurity features

Nearly half of organizations are not using the full set of features and applications available in Microsoft 365, a research from Ensono reveals. Most notably, many enterprises …

city
IoT in smart cities market to reach $132.2 billion by 2026

The global IoT in smart cities market size to grow from $130.6 billion in 2021 to $132.2 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 19.0 % during the forecast …

Infosec products of the month: January 2022

Here’s a look at the most interesting products from the past month, featuring releases from Avast, Axonius, Borderless Security, CyberRes, Deepfence, GrammaTech, Kovrr, …

eBook: Anomaly Detection in Cybersecurity for Dummies
eBook: Anomaly Detection in Cybersecurity for Dummies

One of the best ways to defend against both internal and external attacks is to integrate anomaly detection, a.k.a. user and entity behavior analytics capabilities, into your …

danger
Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business

Vulnerability scanners are still essential tools for defenders protecting enterprise and government networks. But given the rapidly increasing complexity of today’s …

identify
Reducing the blast radius of credential theft

Cybersecurity has come to be defined by identity, with almost every attack today revolving around gaining control of a user’s identity as a means of accessing critical data …

cybersecurity jobs
Cybersecurity staff turnover and burnout: How worried should organizations be?

The heightened risk of cyberattacks on businesses is being compounded by significant recruitment and retention issues within cybersecurity teams, making businesses more …

hole
How costly is an insider threat?

Proofpoint released a report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organizations spent …

face
Number of data compromises reaching all-time high

According to an Identity Theft Resource Center (ITRC) report, the overall number of data compromises (1,862) is up more than 68 percent compared to 2020. The new record number …

Trend Micro
Manufacturing firms turning to the cloud to increase their business agility

European manufacturing firms are embracing cloud-based technologies and services to accelerate their go-to-market plans and improve digital marketing efforts, according to an …

cloud
Cloud infrastructure spending jumped to $18.6B in 3Q21

According to the International Data Corporation (IDC), spending on compute and storage infrastructure products for cloud infrastructure, including dedicated and shared …

Don't miss

Cybersecurity news