Help Net Security
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094615/week_in_review2-400x200.jpg)
Week in review: The state of maritime cybersecurity, zero trust architecture challenges
Here’s an overview of some of last week’s most interesting news, articles and interviews: Patched: Critical bug with public PoC exploit in Cisco infrastructure …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29153125/encryption-1-400x200.jpg)
Out with the old, in with the new: From VPNs to ZTNA
The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and …
![containers](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095724/containers-400x200.jpg)
Increasing number of investigations calls for advanced technology and dedicated teams
Compliance Week conducted a survey which shows the importance of both advanced technology and dedicated teams that can quickly deliver data insights to reduce time and cost …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092943/aid2-400x200.jpg)
Why should enterprises invest in machine identity management tools?
More than 60% of organizations don’t hold full awareness of certificates and keys across their digital assets, according to a research from AppViewX. Over the course of …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
Implementing a strategic planning process is key to drive future revenue growth
While many long term plans were put off due to the COVID-19 pandemic, executive leaders should act now in implementing a strategic planning process for future revenue growth, …
![collaboration](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111540/collaboration-400x200.jpg)
Improved collaboration driving innovation and profitability for hybrid work
Hybrid work is here to stay, and companies are focused on prioritizing improved collaboration in this next normal of work to drive better innovation and increased …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110827/lights-400x200.jpg)
Managed edge services revenues to reach $445.3 million in 2021
Managed edge services promises to be a high-growth market as enterprises look to low-latency edge services to address process efficiencies, support new consumer applications, …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
Previous employees with access to corporate data remain a threat to businesses
Offboarding employees securely is a key problem for business leaders, with 40% concerned that employees who leave a company retain knowledge of passwords that grant access to …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095434/industrial-400x200.jpg)
The cybersecurity of industrial companies remains low, potential damage can be severe
Positive Technologies released a research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020. …
![Internet](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102433/internet-400x200.jpg)
Network traffic analysis market size to reach $5.69 billion by 2028
The global network traffic analysis market size is anticipated to reach $5.69 billion by 2028, expanding at a CAGR of 9.7% from 2021 to 2028, according to a study conducted by …
![building blocks](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111907/building_blocks-400x200.jpg)
Asset management investment to focus on technology and data infrastructure
Investment in technology and data infrastructure sit at the top of asset managers’ priorities as they position themselves to deliver business growth in the recovery from the …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
Finding and using the right cybersecurity incident response tools
Unpacking the layers of a cyberattack is rarely a simple task. You need to analyze many potential entry points, attack paths, and data exfiltration tactics to reveal the scope …
Featured news
Sponsored
Don't miss
- Confidential AI: Enabling secure processing of sensitive data
- Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
- Cross-industry standards for data provenance in AI
- Shuffle Automation: Open-source security automation platform
- Cyber insurance 2.0: The systemic changes required for future security