![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093906/ai3-400x200.jpg)
The rise of biometrics and passwordless security
Whether you realize it or not, our current era of mobile and cloud computing can be defined, both positively and negatively, by shared secrets. Shared secrets — passwords, …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100033/industrial-400x200.jpg)
The need for scalable OT security
As manufacturers and other industrial network owners are becoming more security conscious, they are coming up against security performance issues. Operational Technology (OT) …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093814/user-400x200.jpg)
How to improve the hiring and retaining of infosec professionals?
The cybersecurity staffing and skills shortage is a well-known reality and the situation is predicted to get worse in the coming years. There are many problems There are …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094216/brain-400x200.jpg)
How AI can improve user experience and security for the finance industry
For the last 50 years, the fundamental and largely unchanged model for identifying and authenticating users has been based on the combination of a username and password, …
![locks](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111109/locks-400x200.jpg)
Data breach fallout haunts companies long after the fact
Data breaches have become a priority in most business’ cybersecurity agenda. The series of breaches that companies experienced in 2018 emphasized what security experts …
![Face paint](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093830/face_paint-400x200.jpg)
Tricking attackers through the art of deception
In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093834/puzzle-400x200.jpg)
Security or compliance? Stop choosing between them
The difference between security and compliance is more than just process. It’s philosophy and practice. Compliance can be one tactical execution of a great security strategy …
![Equifax](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102955/equifax-400x200.jpg)
What you should know about the Equifax data breach settlement
Equifax has agreed to pay at least $575 million, and potentially up to $700 million, as part of a global settlement with the Federal Trade Commission, the Consumer Financial …
![Healthcare IoT](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093856/heathcare-iot-400x200.jpg)
Healthcare’s blind spot: Unmanaged IoT and medical devices
From imaging to monitoring systems, infusion pumps to therapeutic lasers and life support machines, medical devices are used to improve and streamline patient care. Many of …
![burn](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110748/burn-400x200.jpg)
How DNS firewalls can burn security teams
It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not even that. The …
![NGFW](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093913/ngfw2-400x200.jpg)
NSS Labs test exposes weaknesses in NGFW products
Firewalls are the most widely deployed network security devices. Enterprises expect next generation firewalls (NGFWs) to prevent exploits and malware from infecting critical …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
True passwordless authentication is still quite a while away
The password has been one of the great inventions in the history of computing: a solution that allowed simple and effective identity and access management when the need arose …