![find](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102832/find2-400x200.jpg)
Top six security and risk management trends
Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner said that security leaders should harness this …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101141/tools2-400x200.jpg)
How connected and secure is the modern workplace?
In collaboration with Microsoft, Ingram Micro Cloud UK commissioned market research firm YouGov to survey 1,000 workers employed by small and mid-size businesses with 50 to …
![collaboration](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111540/collaboration-400x200.jpg)
New LTE attacks can reveal accessed websites, direct victims to malicious sites
Three new attacks against the LTE 4G wireless data communications technology have been pinpointed by researchers from Ruhr-University Bochum and New York University Abu Dhabi. …
![crowd](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101452/crowd-400x200.jpg)
Consumers still happy to exchange data with businesses if there’s a benefit
Data privacy is the subject of much debate and discussion in the media. There has also been much speculation about the effects of recent changes to data privacy legislation …
![climb](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100634/climb-400x200.jpg)
The modern CSO: Future-proofing your organization in a disruptive world
“There are three essential skill sets a modern day CSO must have. The first is knowledge of the business to better align a security strategy to company objectives …
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
Are privacy and personal identity impossible to protect?
While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100640/cloud-400x200.jpg)
The benefits of mature cloud security strategies
Organizations that take a pragmatic approach to securing the use of user- and business-unit-led-cloud services realize appreciable business benefits compared with …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Cybersecurity remains non-core competency for most C-suite executives
In today’s digital economy, it is essential that companies of every size can collect, store and adequately protect customer data and proprietary secrets. Failure to do so will …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101159/arrows-400x200.jpg)
Shift to microservices and continuous software delivery puts pressure on DevOps observability
A Scalyr report, based on a survey of 155 software development practitioners, finds that organizations are shifting away from traditional, monolithic architectures, with …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105302/eye-400x200.jpg)
Week in review: Masking printers’ tracking dots, anti-privacy dark patterns, and WPA3
Here’s an overview of some of last week’s most interesting news and articles: How Facebook and Google nudge users to make anti-privacy choices Facebook, Google and …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102504/question-400x200.jpg)
How to improve software vulnerability disclosure in Europe
As software gets embedded in more and more things we use every day, the problem of software vulnerability reporting and patching rises in importance. Unfortunately, only a few …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104924/building-400x200.jpg)
New infosec products of the week: June 29, 2018
GlobalSign launches IoT Identity Platform addressing IoT device security requirements GlobalSign’s IoT Identity Platform is a set of products and services flexible and …
Featured news
Resources
Don't miss
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)
- Arvest Bank CISO on building a strong cybersecurity culture in banking
- Review: Inside Cyber Warfare, 3rd Edition