![lock](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/19165017/lock-blue-400x200.jpg)
How micro-segmentation creates an uphill battle for intruders
The past few years have seen a major shift in security strategies from looking outward for external threats to detecting and defending against adversaries that have already …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/02103824/5g-3d-400x200.jpg)
Technologies, markets and apps transitioning to the 5G communications era
ResearchAndMarkets released a report that addresses several current technologies (as well as their markets, applications, and other characteristics) that, according to the ITU …
![Mask](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/27144910/face-mask-black-400x200.jpg)
The parallels of pandemic response and IoT security
While adjusting to life under a pandemic, we’ve become familiar with a host of medical and safety terminology that either didn’t exist before or was of little interest to …
![fast](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095617/fast-400x200.jpg)
The benefits of cyber threat intelligence
In this Help Net Security podcast, Maurits Lucas, Director of Intelligence Solutions at Intel 471, discusses the benefits of cyber threat intelligence. He also talks about how …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
Cloud-native watering hole attack: Simple and potentially devastating
In this era of increasing technological complexity, watering hole attacks build on a model of simplicity. Just like predatory animals that hover near sources of water favored …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
99% of security pros concerned about their IoT and IIoT security
Tripwire announced the results of a research report that assessed the security of connected devices across enterprise environments in 2021. Conducted by Dimensional Research, …
![SIM](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/29194856/sim-card-400x200.jpg)
Number of eSIMs installed in connected devices to reach 3.4B in 2025
The number of eSIMs installed in connected devices will increase from 1.2 billion in 2021, to 3.4 billion in 2025; representing growth of 180%, a Juniper Research study found. …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13131647/lock-data-400x200.jpg)
Mobile providers exposing sensitive data to leakage and theft
Data exposure is a significant, unaddressed problem for Europe’s top mobile providers and, by extension, more than 253 million customers who sign up for their services and …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094905/5g-400x200.jpg)
Worldwide 5G connections to reach 619 million by the end of 2021
5G networks are now nearing a critical mass of global commercial network deployments and subscribers, suggesting a rapid upward curve of technology adoption over the next few …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135229/zero-number-2-400x200.jpg)
How to avoid 4 common zero trust traps (including one that could cost you your job)
Formulated by a research analyst over a decade ago, the zero-trust security model was embraced by thought leaders. And when Google, with its unlimited budget and resources, …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/18150523/hands-data-security-400x200.jpg)
Distributed and remote work creating a perfect storm for network security teams
Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a FireMon research has found. The survey of 500 cybersecurity …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095920/network2-400x200.jpg)
Continued WAN and application growth resulting in network complexity
The WAN continues to extend its growth, with the number of enterprises connecting to over 100 inter-regional sites growing by 50%, from 19% in 2020 to 28% in 2021, according …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)