cybersecurity
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102855/stop-400x200.jpg)
Why cyber security can’t just say “no“
There was a time, not long ago, when there were only so many ways of accomplishing an information technology task. Whether you were building a website, setting up a new …
![remote work](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090804/remote_2_hns-400x200.jpg)
Remote work hazards: Attackers exploit weak WiFi, endpoints, and the cloud
Infoblox unveils a global report examining the state of security concerns, costs, and remedies. As the pandemic and uneven shutdowns stretch into a third year, organizations …
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195637/twitter-verizon2-400x200.jpg)
Best practices for healthcare delivery organizations to manage supply chain cybersecurity risks
The Cloud Security Alliance (CSA) released a paper titled Healthcare Supply Chain Cybersecurity Risk Management. Drafted by the Health Information Management Working Group, …
![EU](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100613/EU-lock2-400x200.jpg)
EU’s NIS 2 Directive to strengthen cybersecurity requirements for companies
The Commission welcomes the political agreement reached between the European Parliament and EU Member States on the Directive on measures for a high common level of …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102947/password-400x200.jpg)
The most insecure and easily hackable passwords
No matter how annoying juggling too many passwords can be, for better or worse they are one thing end users have control over. But while choosing a password is easy, choosing …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102734/bulb-400x200.jpg)
Recovering from a cybersecurity earthquake: The lessons organizations must learn
It’s been over a year since the SolarWinds supply chain hack sent shockwaves through thousands of organizations worldwide, but this cybersecurity earthquake is by no means …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
Where do federal agencies stand with zero trust implementation?
One year after the president’s executive order on improving the nation’s cybersecurity, federal agencies are making steady progress toward their zero trust security goals, …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
Top tech for enterprise identity governance and security
Clear Skye and Gradient Flow announced the findings of their survey exploring the state of identity governance and security in the enterprise. The survey questioned 500+ …
![struggle](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104202/struggle-400x200.jpg)
63% of cybersecurity pros say their stress levels have risen over the past year
Tines has released the findings from a report to shine light on mental health in the cybersecurity community. The increased pressures of the past few years, remote work, the …
![medical devices](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/11091922/medical_devices_gradient-400x200.jpg)
Shrinking healthcare cybersecurity gaps between hospitals and manufacturers
The relationship between medical device manufacturers (MDMs) and healthcare delivery organizations (HDOs) has always been challenged by a lack of good communication, mostly to …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19093544/fighter-brain-tech-400x200.jpg)
10 best practices to reduce the probability of a material breach
ThoughtLab announced the findings of its 2022 cybersecurity benchmarking study which analyzed the cybersecurity strategies and results of 1,200 large organizations across 14 …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093228/shield3-400x200.jpg)
An offensive mindset is crucial for effective cyber defense
As ransomware attacks continue to increase and cybercriminals are becoming more sophisticated, the federal government has implemented a more proactive approach when it comes …
Featured news
Sponsored
Don't miss
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality
- FIN7 sells improved EDR killer tool
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)