strategy
![quantum computing](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07084938/quantum_computing1-400x200.jpg)
Real-world examples of quantum-based attacks
Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from …
![White House](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/13140217/whitehouse-2-400x200.jpg)
White House publishes National Cybersecurity Strategy Implementation Plan
The Biden-Harris Administration’s recently released National Cybersecurity Strategy calls for two fundamental shifts in how the United States allocates roles, …
![David Christensen](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/30104102/david_christensen-2-plansource-400x200.jpg)
CISO perspective on why boards don’t fully grasp cyber attack risks
Due to their distinct perspectives, board members and CISOs often have differing views on cyber attack risks. The discrepancy arises when boards need cybersecurity expertise, …
![working on holiday](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28142654/laptop-holiday-400x200.jpg)
Cybersecurity best practices while working in the summer
IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
How ransomware impacts the healthcare industry
Healthcare continues to be one of the most attractive targets for cyberattackers, and the number of breaches affecting the industry is increasing yearly. In this Help Net …
![servers](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/23131508/servers-cloud-400x200.png)
IT leaders believe hybrid cloud solutions are the future of IT
IT leaders are losing sleep over improving overall IT performance (60%), data security (50%), process risk and compliance (46%), and the need to improve agility (41%), …
![extortion](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/22092644/extortion-400x200.jpg)
The rise in cyber extortion attacks and its impact on business security
In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions. A …
![Dennis Fridrich](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26104319/dennis_fridrich-2-trimedx-400x200.jpg)
Preparing health systems for cyber risks and insurance coverage
Our healthcare systems are at risk of infiltration by threat actors, potentially disrupting services, compromising sensitive data, and even jeopardizing patient outcomes. …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094415/money-1-400x200.jpg)
The magic formula for big data companies to outshine the competition
In today’s data-driven world, organizations that can harness the power of big data and derive actionable insights are positioned to succeed. However, the sheer number of big …
![cyber insurance](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08133531/cyber_insurance-yellow-400x200.jpg)
How cyber insurance empowers CISOs
In this Help Net Security video, Fawaz Rasheed, Field CISO at VMware, discusses how cyber insurance remains the high tide that rises ships. For organizations choosing to …
![Brett Harris](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/21123509/brett_harris-2-siemens_healthineers-400x200.jpg)
Exploring the persistent threat of cyberattacks on healthcare
In this Help Net Security interview, Brett Harris, Cybersecurity Officer for the Americas at Siemens Healthineers, discusses the long-term impacts of cyberattacks on …
![Microsoft 365](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/26063958/microsoft365-net-400x200.jpg)
How hardening Microsoft 365 tenants mitigates potential cloud attacks
Moving critical data and workloads to the cloud has significantly changed information security teams. But most don’t have the resources to be successful in their cloud attack …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality