![patch](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094309/patch-400x200.jpg)
July Patch Tuesday forecast: Rules are changing for companies with custom applications
Every month I discuss the regular patches released for operating system or applications, but today I want to focus on some of the development components that are often …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
Why identity is the foundation of security
Once upon a time, companies secured their valuable information by locking file cabinets and installing passwords and firewalls around databases and systems in office-based …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Experts weigh in on salient issues around emerging threats and security tech
RSA Conference unveiled expert insights into salient issues around emerging threats and security technologies. Based on industry observations and interactions with partners …
![Face](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101620/face-dark-400x200.jpg)
Insider attacks still far more difficult to detect and prevent than external cyber attacks
A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094202/iphone2-400x200.jpg)
Most organizations plan to adopt new authentication solutions within two years
Enabling mobile device authentication with biometric-based access is the best approach to eliminate passwords, according to MobileIron. Percentage of respondents identifying …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101639/connection-400x200.jpg)
How companies innovate as they face industry disruption
Nearly three-quarters (72%) of industry sectors experienced an increase in disruption over the past eight years, leaving $41 trillion in enterprise value (market …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100728/tunnel-400x200.jpg)
Week in review: The art and science of password hashing, cybersecurity crisis comms
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Bringing more talented individuals into the security industry In this interview, Tony …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101119/zero-400x200.jpg)
Trust dimensions in zero trust security
The increasing sophistication of cyberattacks and subsequent costs associated with containment and remediation has brought about an evolution in the security industry. …
![building blocks](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111907/building_blocks-400x200.jpg)
Migrations represent the number one challenge for database professionals
Migrations are now the number one priority for database professionals, a new Redgate report reveals. Cloud usage is on the up, for example, with 44% of organizations now using …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104856/connection-400x200.jpg)
To benefit from DevOps implementation, security and dev teams must communicate better
Despite the enterprise benefits assured by adopting a DevOps culture, the majority of IT leaders believe communication between IT security and software development must …
![circle](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100231/circle-400x200.jpg)
Disaster recovery readiness is essential for hybrid and multi-cloud strategies
Disaster recovery capability is a key factor in implementing hybrid and multi-cloud strategy, a new Teradici study reveals. Of the respondents who had implemented a hybrid or …
![communication](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09094006/communication-400x200.jpg)
Cybersecurity crisis communication: How to do it well
Riviera Beach is one of the several cities and towns in Florida which have recently been hit with ransomware. Its local government, like that of Lake City before it, decided …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes