![NGINX](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095223/nginx-400x200.jpg)
Building security into cloud native apps with NGINX
Companies like Airbnb, Uber and DoorDash, which have a cloud-based software infrastructure as one of their main enablers, are disrupting the hospitality, transportation and …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
Machine learning fundamentals: What cybersecurity professionals need to know
In this Help Net Security podcast, Chris Morales, Head of Security Analytics at Vectra, talks about machine learning fundamentals, and illustrates what cybersecurity …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112438/usa-flag-400x200.jpg)
Is 2019 the year national privacy law is established in the US?
Data breaches and privacy violations are now commonplace. Unfortunately, the consequences for US companies involved can be complicated. A company’s obligation to a person …
![finance](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095930/finance-400x200.jpg)
How can we improve adoption and ROI on security investments?
Traditionally, whenever employees are required to interact with security solutions, they push back because they don’t want their lives to be made more complicated with extra …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095247/zero-400x200.jpg)
Zero Trust browsing: Protect your organization from its own users
To the casual observer, the cyberattack landscape is constantly shifting. In recent years, the threats and scams have evolved from Nigerian princes to stranded travelers, …
![Blocks](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101432/blocks-400x200.jpg)
5 reasons why asset management is a hot topic
Sometimes buzzwords are good predictors of what organizations see as priorities in a given year. If you surveyed both the revenue-generating and security functions of …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110851/brain-400x200.jpg)
AI won’t solve all of our cybersecurity problems
AI is already supporting businesses with tasks ranging from determining marketing strategies, to driverless cars, to providing personalized film and music recommendations. And …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
Is your organization ready for the data explosion?
“Data is the new oil” and its quantity is growing at an exponential rate, with IDC forecasting a 50-fold increase from 2010 to 2020. In fact, by 2020, it’s estimated that new …
![eye dark](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105300/eye-dark-400x200.jpg)
Taking ethical action in identity: 5 steps for better biometrics
Glance at your phone. Tap a screen. Secure access granted! This is the power of biometric identity at work. The convenience of unlocking your phone with a fingertip or your …
![handshake](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101343/handshake-400x200.jpeg)
How to know when you’re ready for a fractional CISO
Many companies eventually find themselves in the following situation: they’re growing, their technology, infrastructure and teams are expanding, perhaps a M&A is on the …
![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195511/fire-match-400x200.jpg)
How accepting that your network will get hacked will help you develop a plan to recover faster
As anyone in the network security world will tell you, it is an extremely intense and stressful job to protect the corporate network from ever-evolving security threats. For a …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102703/privacy-400x200.jpg)
Debunking conventional wisdom to get out of the security and privacy rut
Given the unprecedented rate of technological change, the dizzying news cycle, and an always-on social media mentality, it may be surprising to learn that when it comes to …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history