![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
SecOps teams face challenges in understanding how security tools work
Security professionals are overconfident in their tools with 50% reporting that they have experienced a security breach because one or more of their security products was not …
![error](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/13134949/error-x-400x200.jpg)
Researchers design a tool to identify the source of errors caused by software updates
We’ve all shared the frustration when it comes to errors – software updates that are intended to make our applications run faster inadvertently end up doing just …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103134/bulb-400x200.jpg)
Key technology trends that will redefine businesses over the next three years
To compete and succeed in a world where digital is everywhere, companies need a new focus on balancing “value” with “values,” aligning their drive to create business value …
![complex](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100145/complex-400x200.jpg)
Week in review: The future of DNS security, acquiring cyber talent in 2020, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Shadow IT accounts with weak passwords endanger organizations 63% of enterprise …
![RSA Adaptive Authentication](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/12165949/rsa_adaptive_authentication-400x200.jpg)
New infosec products of the week: February 14, 2020
RSA Archer SaaS: An integrated approach to managing risk RSA Archer SaaS can help reduce the time and resources dedicated to on-premise platform upgrades, patches, and …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100605/healthcare-400x200.jpg)
Seven cybersecurity and privacy forecasts for 2020
The developments in the area of cybersecurity are alarming. As the number of smart devices in private households increases, so do the opportunities for cyber criminals to …
![spreadsheet](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/13113448/spreadsheet-green-400x200.jpg)
43% of IT professionals are still tracking assets in spreadsheets
43% of IT professionals report using spreadsheets as one of their resources for tracking assets, according to Ivanti. Further, 56% currently do not manage the entire asset …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101804/certificate-400x200.jpg)
Digital certificates still cause unplanned downtime and application outages
51% of enterprises claim low ability to detect and respond to digital certificate and key misuse, according to Keyfactor and the Ponemon Institute. “Connectivity and the …
![city night](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111601/city_night-400x200.jpg)
Global spending on smart cities initiatives to total nearly $124 billion in 2020
Global spending on smart cities initiatives is forecast to total nearly $124 billion this year, an increase of 18.9% over 2019, according to IDC. The top 100 cities investing …
![(IN)SECURE Magazine 65](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/12134439/mag1-400x200.jpg)
(IN)SECURE Magazine issue 65 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 65 has been released today. It’s a free …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093146/robot-400x200.jpg)
Security pros anticipate automation will reduce IT security headcount, but not replace human expertise
The majority of companies (77 percent) continue to use or plan to use automation in the next three years, according to a Ponemon Institute and DomainTools survey. The biggest …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
A closer look at the global threat landscape
60% of initial entries into victims’ networks leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to …
Featured news
Sponsored
Don't miss
- Some good may come out of the CrowdStrike outage
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
- eBook: 20 tips for secure cloud migration
- Microsoft 365 users targeted by phishers abusing Microsoft Forms
- Enhancing threat detection for GenAI workloads with cloud attack emulation