cybersecurity
Apps, devices and workloads provide an ecosystem cornerstone for zero trust growth
As cybersecurity professionals, we admit it: zero trust has become the industry’s biggest buzzword. Some argue it’s a principle, others argue it’s a framework, others still …
IoT security is foundational, not optional
A PSA Certified report predicts that this year will mark a turning point in securing the Internet of Things (IoT), as the industry collectively commits to addressing the …
Security and vulnerability management market to reach $15.86 billion by 2030
The global security and vulnerability management market is expected to grow from $6.7 billion in 2020 to $15.86 billion by 2030, at a CAGR of 9% during the forecast period …
Leveraging mobile networks to threaten national security
In this interview with Help Net Security, Rowland Corr, Director of National Security Intelligence at AdaptiveMobile Security, explains how mobile networks can be leveraged as …
Product showcase: SharePass – Secure communication made simple
We all know the numbers. Data breaches are up 30% year over year, ransomware runs rampant without showing any signs of slowing, and identity theft reports have doubled to …
Container security market to reach $3.6 billion by 2026
The global container security market size is expected to grow from an estimated value of $1.3 billion in 2021 to $3.6 billion by 2026, at a Compound Annual Growth Rate (CAGR) …
Companies spending $6M on ransomware mitigation: Is it working?
A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation …
Hardware security modules market to reach $7.9 billion by 2028
The global hardware security modules market size was valued at $3.1 billion in 2020 and is projected to reach $7.9 billion by 2028, growing at a CAGR of 12.4% from 2021 to …
How mobile app usage data could reveal a person’s identity
The time a person spends on different smartphone apps is enough to identify them from a larger group in more than one in three cases say researchers, who warn of the …
Help Net Security: Healthcare Cybersecurity Report has been released
Our newest report takes a closer look at one of the most targeted industries today – healthcare. As exhausted healthcare professionals struggle with an extraordinary …
How configuration assessments help improve cyber defenses
There’s an old adage in business; if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security …
A comparison of NDR solutions: Deep packet inspection (DPI) vs. metadata analysis
Executive summary In today’s complex IT environments, Network Detection and Response (NDR) solutions are crucial to identify, assess, and respond to cyberthreats. Many NDR …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader