Expert analysis
![patch tuesday](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12093102/patch-tuesday-yellow-400x200.jpg)
August 2023 Patch Tuesday forecast: Software security improvements
August 2023 Patch Tuesday: Microsoft fixes critical bugs in Teams, MSMQ The continued onslaught of phishing attacks, ransomware deployment, and other exploitation is forcing …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28200048/biometrics2-400x200.jpg)
Multi-modal data protection with AI’s help
Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must deal with first order chaos and risk much like …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142723/cloudfiles1-400x200.jpg)
Keeping the cloud secure with a mindset shift
Gartner estimates that in 2023 worldwide end-user spending on public cloud services will grow by 21.7% and hit nearly $600 billion. Even as the economic downturn has most …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/23181110/hand-puzzle-400x200.png)
How the best CISOs leverage people and technology to become superstars
What separates superstar CISOs from the rest of the pack is that they are keenly aware of the burgeoning threat landscape and the cybersecurity skills shortage, but they don’t …
![ZTNA](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/26120527/ztna-400x200.jpg)
ZTNA can be more than a VPN replacement for application access
In the wake of increased workforce mobility, today’s organizations require more innovative, more flexible, and more secure methods of granting network and application access …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102709/patch-400x200.jpg)
A step-by-step guide for patching software vulnerabilities
Coalition’s recent Cyber Threat Index 2023 predicts the average Common Vulnerabilities and Exposures (CVEs) rate will rise by 13% over 2022 to more than 1,900 per month in …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
Enterprises should layer-up security to avoid legal repercussions
The role of CISO these days requires a strong moral compass: You have to be the one speaking up for the protection of customer data and be ready to handle uncomfortable …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103446/healthcare-400x200.jpeg)
Why data travel is healthcare’s next big cybersecurity challenge
Do you know where your patients’ data lives once it’s in the cloud? Unfortunately, for many healthcare organizations, the answer is no – or, at least, it’s not a definitive …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/31190026/ransomware-keyboard-400x200.jpg)
Trends in ransomware-as-a-service and cryptocurrency to monitor
In January, law enforcement officials disrupted the operations of the Hive cybercriminal group, which profited off a ransomware-as-a-service (RaaS) business model. Hive is …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160756/llms-1-400x200.jpg)
Combatting data governance risks of public generative AI tools
When companies utilize public generative AI tools, the models are refined on input data provided by the company. Regarding data security, unauthorized use of sensitive data or …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/17130642/ransomware-1600-400x200.jpg)
Staying ahead of the “professionals”: The service-oriented ransomware crime industry
Ransomware has been a hugely profitable industry for criminal gangs for the last few years. The total amount of ransom paid since 2020 is estimated to be at least $2 billion, …
![passwordless](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28144836/passwordless-1-400x200.jpg)
Overcoming user resistance to passwordless authentication
Many organizations agree in theory that passwordless authentication is the future, but getting there represents a significant change management challenge. The migration to …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities