![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113147/job_hunt-400x200.jpg)
What employers need to know about cybersecurity jobseekers
Based on a blind survey of cybersecurity professionals in the United States and Canada, a new (ISC)² report reveals low numbers of highly engaged workers. Only 15% of …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102449/puzzle-400x200.jpg)
Nearly half of security pros rarely change their security strategy, even after a cyber attack
Nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber attack. This level of cyber …
![future](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105715/future-400x200.jpg)
Digital readiness and transformation: Agile and DevOps
While most organizations are committed to the full adoption of both agile and DevOps, many are struggling with key challenges and missing out on the extensive benefits these …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101737/phillips-IntelliSpace-Portal-400x200.jpg)
Phillips clinical imaging solution plagued by vulnerabilities
Phillips is developing a software update to mitigate 35 CVE-numbered vulnerabilities in the Philips IntelliSpace Portal (ISP), a clinical imaging visualization and analysis …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104737/idea2-400x200.jpg)
Download: CISSP Exam Study Guide
This promotion has ended. The CISSP Exam Study Guide provides a solid foundation for anyone preparing to become a Certified Information Systems Security Professional. It …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103054/ddos-400x200.jpg)
Surge in memcached-based reflected DDoS attacks is due to misconfigured servers
Massive memcached-based reflection DDoS attacks with an unprecedented amplification factor have been ongoing for the last few days, by taking advantage of memcached servers …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104943/hole-400x200.jpeg)
Cybersecurity pros don’t feel equipped to stop insider attacks
Based on interviews with nearly 1,500 cybersecurity professionals over three years, Haystax Technology released a study that makes it clear that organizations are feeling the …
![mobile apps](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102223/mobile-apps-400x200.jpg)
Mobile security: A look at the risks, and what you can do
A new report from Verizon found that organizations across numerous industries compromised mobile data security because of speed to market priorities and a lack of threat …
![UK flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113604/uk-flag-400x200.jpg)
UK cyber risk picture: Emergency services at risk of a major cyber attack
The UK’s emergency services are at risk of a major cyber-attack. This is the finding of a new landscape analysis, issued by intelligence provider Anomali. The UK Threat …
![Google hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103340/google-hand-400x200.jpg)
How Google implements the Right To Be Forgotten
Who is asking Google to delist certain URLs appearing in search results related to their name, and what kind of requests does the search giant honor? The company has been …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101910/android-biohazard-400x200.jpg)
Mobile banking Trojans spread confusion worldwide
Consumers around the world that use mobile banking apps are at a greater risk of being tricked by cybercriminals and falling victim to mobile banking theft. This is according …
![smart home](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104303/smart_home-400x200.jpg)
Is that smart device secure, and will it protect your privacy?
The decision to introduce a new smart device into your home should come only after you’ve answered these two questions affirmatively: “Will the device improve the …
Featured news
Resources
Don't miss
- North Korean hackers spotted using ClickFix tactic to deliver malware
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022