![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Investing in the right future for the cloud
In the last decade we have seen cloud technology evolve from a useful competitive business tool to one of the key foundations of the business world. Migrating assets, …
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
Quantum computing is imminent, and enterprises need crypto agility now
Nearly 100 years ago, the first quantum revolution ushered in the technological advances that have made our modern life possible. Advances in quantum physics led to the …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100844/usa-400x200.jpeg)
The future of FISA
News that court-approved Foreign Intelligence Surveillance Act (FISA) searches dropped to new lows in 2020 hit the papers recently, and it raised some eyebrows as well as …
![syringe](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094041/syringe1-400x200.jpg)
Digital criminals turn toward vaccines to capitalize on COVID-19
Cybercriminals continue to capitalize on the hysteria and worry caused by COVID-19, both in the physical sphere and digital ecosystem, exploiting the significant global unmet …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/20075020/risk-hand-400x200.jpg)
Mitigating third-party risks with effective cyber risk management
Third-party engagement has steadily become an essential part of business operations for many organizations, enlisted for all kinds of products and services across nearly all …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
The 6 steps to implementing zero trust
More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092903/lock-blue-400x200.jpg)
Enhancing cyber resilience: What your team needs to know
In the wake of malicious attacks, we often witness everyone focusing on searching for those responsible, as opposed to how or why the attack took place and the most critical …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/23122821/ai-brain-bkg-400x200.jpg)
For CISOs and artificial intelligence to evolve, trust is a must
Artificial Intelligence (AI) is no longer the future – it is already in use in our homes, cars, and, often, our pockets. As the technology continues to expand its role …
![Phone](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112408/phone-red-400x200.jpg)
How can companies prioritize contact center security?
Security is front of mind for a lot of organizations these days, especially due to the 400% increase in cyberattacks since the pandemic started. Notable and alarming attacks …
![COVID-19](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/07134313/covid-19-mask-400x200.jpg)
Defending the COVID-19 vaccine rollout with best practices from the cybersecurity industry
Over the past year, pharmaceutical companies and healthcare organizations have rushed to develop a COVID-19 vaccine. It is a testament to the innovations of the medical …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
Reformulating the cyber skills gap
Despite a positive (and significant) decrease from over 4 million unfilled cybersecurity jobs in 2019, there is still a staggering 3.12 million global shortage of workers with …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110509/usa-flag-1-400x200.jpg)
Biden’s plan for strengthening US cybersecurity is too soft
As a security professional, I applaud President Biden’s Executive Order on Improving the Nation’s Cybersecurity. Cyberattacks are growing greater in scope and number and have …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?