strategy

Enterprises are embracing the multicloud, turning to providers for strategy
Enterprises in the U.S. are increasingly embracing multicloud operating models and are looking to cloud service providers to help them choose the right clouds for the right …

The 5G market is about to take off: What to expect in 2022 and beyond?
5G is recognized as an important infrastructure for both developed and developing countries. By the end of 2021, 79 nations have either commercialized 5G or are conducting 5G …

Putting the “sec” in DevSecOps: An overall reduction of risk
In this Help Net Security interview, Cindy Blake, Senior Security Evangelist at GitLab, talks about the importance of integrating security in DevSecOps and how to overcome the …

Your supply chain: How and why network security and infrastructure matter
With digital transformation, the rapid adoption of cloud computing and the IoT, and the global scale of today’s supply chains, cybercriminals have more entry points to …

Automation investments are driving revenue, productivity and employment
SnapLogic and the Centre for Economics and Business Research (Cebr) released a research into the economic impact of automation. The study looks at the growing adoption of …

Does your company employ a CISO? Many are operating without security leadership
45% of companies do not employ a Chief Information Security Officer (CISO), a Navisite research found. Of this group, 58% think their company should hire a CISO. Only 40% of …

The CIS Benchmarks community consensus process
The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security guidance. The first CIS …

How to handle third-party security risk management
In this Help Net Security interview, Demi Ben-Ari, CTO at Panorays, talks about third-party security risk management and the repercussions of a third-party breach. He also …

How to improve your SaaS security posture and reduce risk
In this Help Net Security interview, Maor Bin, CEO at Adaptive Shield, talks about the SaaS security space and how Adaptive Shield help security teams gain control over their …

Combating cybercrime: Lessons from a CIO and Marine veteran
A colleague asked me recently if I thought the FBI had finally experienced enough of the cyberattacks plaguing the United States and would now more aggressively pursue the …

We need a Cyber Awareness Century
For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are still very unequipped to handle the internet’s …

Operational technology and zero trust
Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …