![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113147/job_hunt-400x200.jpg)
Finding skilled pros remains a challenge, cloud and security in high demand
Tech teams will continue to grow in the second half of the year, but finding the right talent won’t be easy, according to Robert Half Technology’s State of U.S. …
![Microsoft OneDrive](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094022/microsoft-onedrive-400x200.jpg)
Microsoft OneDrive users get an even more secure Personal Vault
Microsoft has announced that, by the end of the year, all users of its OneDrive cloud storage service will get a Personal Vault, which will provide added protection for …
![G Suite](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102108/gsuite-400x200.jpg)
Google delivers new G Suite security tools
Google has announced several new security tools for G Suite admins and users, as well as a new 2FA option: one-time security codes based on security keys. Email security …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094211/lock-400x200.jpg)
Review: Specops uReset
Yes, it’s 2019 and we still have to deal with passwords. They should be replaced or supplemented with multi-factor authentication as soon as possible, but it looks like they …
![colors](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100157/colors-400x200.jpg)
Why simplifying cybersecurity is essential for mutual fund boards of directors
Imagine if you were tasked with the understanding of an element of your job outside of your job description, and that the understanding of this element, if not done correctly, …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095734/danger-400x200.jpg)
Cybercriminals leverage malicious Office docs, Mac malware, web app exploits
There’s been a 62% increase in overall malware detections in Q1 2019 compared to the previous quarter. A new WatchGuard report also found that cybercriminals are …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095955/cloud-tech-400x200.jpg)
Cloud security exacerbated by immature security practices
Enterprises are struggling to keep up with the rapid expansion of cloud within their businesses, according to Symantec. Surveying 1,250 security decision makers across the …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094431/open-400x200.png)
1 in 10 open source components downloaded in 2018 had a known security vulnerability
This year’s Sonatype report reveals the best practices exhibited by exemplary open source software projects and commercial application development teams. As in years past, it …
![dotcom](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094030/dotcom-400x200.jpg)
Every year, millions of web domains are registered to defraud businesses
The growth of fraudulent domains corresponds to the growth of the overall domain landscape, according to Proofpoint. Between Q1 and Q4 2018, registrations of fraudulent …
![Speed](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101632/speed-400x200.jpg)
Why businesses need IAM to push their zero trust frameworks forward
Many organizations are finding themselves between a rock and a hard place when it comes to the security of their digital transformation strategies. On the one hand, the number …
![mobile](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101146/mobile_street-400x200.jpg)
Emergency Presidential Alerts can be spoofed, researchers warn
Spurred by the panic-inducing fake alarm about an inbound ballistic missile received by Hawaii residents in January 2018, a group of researchers from University of Colorado …
![handshake](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100637/handshake-400x200.jpeg)
You don’t just acquire a company, but also its cybersecurity posture
53% of IT and business decision makers report their organization has encountered a critical cybersecurity issue or incident during a M&A deal that put the deal into …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes