![Binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195635/binary-sun-400x200.jpg)
Business security in the age of malicious bots
As most technologies, bots can be used for good and bad purposes, and the information security industry is doing its best to minimize the adverse effects of the latter …
![hospital](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103807/hospital-400x200.jpeg)
How the healthcare industry can improve online trust
Privacy on the internet is important in all industries, but none more so than the healthcare sector, which handles mass amounts of online health data daily. While any data …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111052/people-400x200.jpg)
Bringing more talented individuals into the security industry
In this interview, Tony Vizza, Director of Cybersecurity Advocacy, Asia-Pacific, (ISC)2, talks about the growing information security skills shortage, the importance of …
![up](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102706/up-400x200.jpg)
Priorities IT pros follow to ensure ingrained privacy and compliance
Products that help businesses discover and map data flows top the list of purchase plans and the privacy team is playing a larger role in privacy tech purchasing decisions as …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095405/cloud-400x200.jpg)
What is and what is not working for security operations teams in securing cloud data
Security professionals continue to face a number of major challenges as more organizations move legacy IT operations to cloud infrastructure and applications, and traditional …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101644/money-400x200.jpg)
Annual spend on Mobile Edge Computing will reach $11.2 billion by 2024
Total annual spend on Mobile Edge Computing (the collection and analysis of data at the source of generation, at the Edge of the network, instead of a centralised location …
![facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113615/facepalm-400x200.png)
Week in review: Vaccinating algorithms against attacks, cybersecurity pros burning out
Here’s an overview of some of last week’s most interesting news, articles and reviews: Anatomy of a ransomware attack: How attackers gain access to unstructured …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194841/healthcare-400x200.jpg)
Medtronic recalls vulnerable MiniMed insulin pumps
Medtronic, the world’s largest medical device company, has issued a recall of some of its insulin pumps because they can be tampered with by attackers. About the …
![traffic](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095816/traffic-400x200.jpg)
The biggest SecOps burdens hindering progress for enterprises and MSSPs
Only 16% of security operations professionals think that their SecOps programs have reached the highest maturity level, according to a Siemplify and Cyentia Institute study. …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094016/drown-400x200.jpg)
Cybersecurity professionals are outgunned and burned out
Nearly half (48 percent total) of cybersecurity leaders across France, Germany and the UK believe their teams are falling behind in the skills race against would-be cyber …
![dislike](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094442/dislike-400x200.jpg)
Consumers believe privacy is not possible, leading to a change in online behavior
82% of online users in the US and 75% in the UK are choosing to change the way they behave online, according to a new consumer survey by FigLeaf. For these respondents, 74% …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102312/bulb-400x200.jpeg)
New infosec products of the week: June 28, 2019
Elastic SIEM: Speed, scale, and analytical power drive your security operations and threat hunting The initial launch of Elastic SIEM introduces a new set of data integrations …
Featured news
Resources
Don't miss
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!