![remote work](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02105451/remote_work-400x200.jpg)
How COVID-19 affected remote work, customer engagements, and return to the office plans
Top-tier enterprises were 2.6 times as likely to have grown revenue, 2.5 times as likely to have reached profit goals and 2.1 times as likely to have high employee …
![Internet](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102433/internet-400x200.jpg)
Global WAN optimization market to reach $4.88 billion by 2027
The global wide area network optimization market size is estimated to reach $4.88 billion by 2027, registering a CAGR of 9.5% from 2020 to 2027, according to Grand View …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093824/money-400x200.jpg)
Week in review: Costliest cybersecurity failures, DNS hijacking protection, AWS security automation
Here’s an overview of some of last week’s most interesting news, interviews and articles: Cisco patches critical, wormable RCE flaw in Cisco Jabber Cisco has …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100620/patch-400x200.jpg)
September 2020 Patch Tuesday forecast: Back to school?
Another month has passed working from home and September Patch Tuesday is upon us. For most of us here in the US, September usually signals back to school for our children and …
![vote](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111919/vote-400x200.jpg)
Mobile voting: Hype or reality?
The 2020 United States presidential election is already off to a rocky start. We’ve seen technology fail in the primary elections, in-person campaigning halted, and a plethora …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
Why data is the missing link in your cybersecurity strategy
Everyone’s aware of how challenging maintaining a strong cybersecurity posture is these days. There’s no longer a perimeter to protect and with remote working becoming the …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101750/cryptocurrency2-400x200.jpg)
Cryptomining activity could be a sign your servers are under attack
Organizations’ on-premise and cloud-based servers are compromised, abused and rented out as part of a sophisticated criminal monetization lifecycle, Trend Micro research …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094714/compliance-400x200.jpg)
2020 trends in SOX compliance
SOX & Internal Controls Professionals Group released a survey which measures the costs, execution, challenges and priorities faced by companies that comply with the …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094905/5g-400x200.jpg)
Recommendations to enhance subscriber privacy in 5G
There are clear benefits of 5G SIM capabilities to protect the most prominent personal data involved in mobile communications, according to the Trusted Connectivity Alliance. …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Which cybersecurity failures cost companies the most and which defenses have the highest ROI?
Massachusetts Institute of Technology (MIT) scientists have created a cryptographic platform that allows companies to securely share data on cyber attacks they suffered and …
![Cisco Jabber](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/03101235/cisco-jabber-ui-400x200.jpg)
Cisco patches critical, wormable RCE flaw in Cisco Jabber
Cisco has patched four vulnerabilities in its Jabber client for Windows, the most critical of which (CVE-2020-3495) could allow attackers to achieve remote code execution by …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/02103824/5g-3d-400x200.jpg)
Private, unlicensed 5G mobile network adoption may intensify NetOps and SecOps challenges
While 5G sometimes seems like the panacea for just about everything, it will likely intensify the already common friction between NetOps and SecOps teams that will take part …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege