cybersecurity
![](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/26005908/securonix-analytics-sandbox-400x200.jpg)
Network security sandbox market to reach $43 billion by 2027
Amid the COVID-19 crisis, the global market for network security sandbox estimated at $4 billion in the year 2020, is projected to reach a revised size of $43 billion by 2027, …
![Scott Laliberte](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/14090306/scott_laliberte_2_protiviti-400x200.jpg)
AI and ML implementation in cybersecurity programs pushes for a change in people’s mindset
In this interview with Help Net Security, Scott Laliberte, Managing Director at Protiviti, talks about the implementation of AI and ML in cybersecurity programs, why this is a …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184922/biometrics2-400x200.jpg)
Governments struggle to deliver secure online citizen services
Auth0 released the findings of its Public Sector Identity Index, a global research report that provides government technology leaders with insight into the identity maturity …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093354/mac-laptop-400x200.jpg)
The security of devices held by public sector employees
Apricorn announced new findings from Freedom of Information (FoI) requests submitted to 16 government departments into the security of devices held by public sector employees. …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135229/zero-number-2-400x200.jpg)
Zero-trust security market to reach $64.4B by 2027
Amid the COVID-19 crisis, the global market for zero-trust security estimated at $18.3 billion in the year 2020, is projected to reach a revised size of $64.4 billion by 2027, …
![check](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094507/check-400x200.jpg)
IR and SimEx: Can and should they be standardized?
The National Cyber Security Centre (NCSC) intends to launch a new assurance scheme for incident response (IR) and simulated exercises (SimEx) in Q2 2022, which could become a …
![Matthew Rosenquist](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/12111206/matthew_rosenquist_2-eclipz-400x200.jpg)
AI to bring massive benefits, but also cause great concern
In this interview with Help Net Security, Matthew Rosenquist, CISO at Eclipz.io, explains the benefits as well as the disadvantages of AI, and the tremendous impact it could …
![SecOps](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/02172811/secops-gears-400x200.jpg)
SecOps teams are understaffed and overworked
Organisations have work to do if they want to attract and retain diverse talent in their security operations (SecOps) teams, according to SOC.OS and Sapio Research. SecOps …
![communication](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09094006/communication-400x200.jpg)
Why is intergenerational collaboration critical in advancing zero trust security progress?
Baby Boomers play a critical role in accelerating zero trust security frameworks due to experience in integrating legacy technologies into cloud and hybrid IT environments, an …
![wireless](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093439/wireless1-400x200.jpg)
Many users don’t know how to protect their broadband Wi-Fi routers
Millions of home broadband Wi-Fi routers in the UK could be at risk because many internet users do not take basic security precautions that could protect them from online …
![check](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094509/check2-400x200.jpg)
The future of security protocols for remote work
Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a …
![Trend Micro](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/12121737/trendmicro-research-manufacturing-400x200.jpg)
Manufacturers are starting to realize the importance of OT security
While rapid technology advances have improved manufacturing operations in recent years, combining new and legacy operational technology (OT) has created security gaps that …