cybersecurity
![icosahedral](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103458/icosahedral-400x200.jpg)
How data science delivers value in a post-pandemic world
With businesses from various industries tightening their belt due to pandemic-induced economic challenges, investing in data science applications and building out their teams …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
New technique keeps your online photos safe from facial recognition algorithms
In one second, the human eye can only scan through a few photographs. Computers, on the other hand, are capable of performing billions of calculations in the same amount of …
![red](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/01132207/red-stairs-400x200.jpg)
Key cybersecurity industry challenges in the next five years
What key challenges will the cybersecurity industry be dealing with in the next five years? Pete Herzog, Managing Director at ISECOM, is so sure that artificial intelligence …
![Function-as-a-Service](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/01125617/faas-400x200.jpg)
Using confidential computing to protect Function-as-a-Service data
Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming from years of data successfully …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
Adopting more tools doesn’t necessarily improve security response efforts
While organizations have slowly improved in their ability to plan for, detect and respond to cyberattacks over the past five years, their ability to contain an attack has …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111933/ddos-1-400x200.jpg)
DDoS traffic capitalizes on remote working connectivity reliance to disrupt service provider targets
In the first quarter of 2020, DDoS attacks rose more than 278% compared to Q1 2019 and more than 542% compared to the last quarter, according to Nexusguard. Working from home …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105123/person-400x200.jpg)
CIOs are apprehensive about interruptions due to expired machine identities
TLS certificates act as machine identities, safeguarding the flow of sensitive data to trusted machines. With the acceleration of digital transformation, the number of machine …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
40% of security pros say half of cyberattacks bypass their WAF
There are growing concerns around the number of businesses vulnerable to cyberattacks due to hackers’ ability to bypass their Web Application Firewall (WAF), Neustar reveals. …
![SIEM](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/28155258/siem-blue-400x200.jpg)
How do I select a SIEM solution for my business?
A Security Information and Event Management (SIEM) solution collects and analyzes activity from numerous resources across your IT infrastructure. A SIEM can provide …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Ransomware attacks are increasing, do you have an emergency plan in place?
39% of organizations either have no ransomware emergency plan in place or are not aware if one exists. This is despite more ransomware attacks being recorded in the past 12 …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094342/danger-400x200.jpg)
Surge in unique clients reporting brute-force attack attempts
There’s a significant uptick in the number of unique clients who have reported brute-force attack attempts, ESET reveals. Trend of RDP attack attempts against unique …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/11105012/risk-low-high-400x200.jpg)
Organizations need an agile response to unexpected risks
The average $5 billion company incurs delays of roughly 5 weeks per year in new product launches due to missed risks, with a $99 million opportunity cost, according to …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality