Please turn on your JavaScript for this page to function normally.
Network security sandbox market to reach $43 billion by 2027

Amid the COVID-19 crisis, the global market for network security sandbox estimated at $4 billion in the year 2020, is projected to reach a revised size of $43 billion by 2027, …

shield
SMBs should consider new approaches for increasing their cybersecurity posture

SMBs can obtain advice about cybersecurity quite easily from a plethora of resources. Getting their hands on practical technology solutions is, on the other hand, more of a …

5G
Five megatrends for 5G mmWave for 2022 and beyond

It’s been a tumultuous year for 5G as wireless carriers scrambled to deploy their networks at mid-band and increasingly millimeter-wave frequencies, and the trend will …

bulb
Rethinking cybersecurity becomes imperative as devices and apps move away from physical offices

69.1% of professionals with security responsibility believe a rethink is needed to deal with the threat of cybersecurity now that devices and applications have moved outside …

data
When done right, network segmentation brings rewards

96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, …

5G
Adoption of private 5G networks accelerates, as organizations look to improve security and speed

There’s a significant interest in private 5G networks, with 90% of executives expecting that private 5G will become the standard network choice, according to an …

Terry Traina
Leveraging AIOps for a holistic view of network performance and security

In this interview with Help Net Security, Terry Traina, CTO at Masergy, talks about the benefits of leveraging AIOps and how it can help thwart growing security threats. Many …

network
What are the world’s most network ready markets?

The latest results and rankings of the Network Readiness Index (NRI) were released by the Portulans Institute and STL, revealing how countries around the world are leveraging …

risk
Extracting value from the interconnected network of risk management

From the CISO to the SOC operator, defenders struggle to maintain complete situational awareness. Holistic approaches to risk management require the implementation of a …

Code
How to protect air-gapped networks from malicious frameworks

ESET researchers present their analysis of all malicious frameworks used to attack air-gapped networks known to date. An air-gapped network is one that is physically isolated …

crypto currency
Tor2Mine cryptominer has evolved: Just patching and cleaning the system won’t help

Sophos released new findings on the Tor2Mine cryptominer, that show how the miner evades detection, spreads automatically through a target network and is increasingly harder …

IoT connection
Your supply chain: How and why network security and infrastructure matter

With digital transformation, the rapid adoption of cloud computing and the IoT, and the global scale of today’s supply chains, cybercriminals have more entry points to …

Don't miss

Cybersecurity news