Expert analysis
![road](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102349/road-400x200.jpg)
How to implement cybersecurity for modern application connectivity
The president’s recent executive order on improving the nation’s cybersecurity highlights the security threats facing our country — and it couldn’t be more timely. Ransomware …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101057/healthcare-400x200.jpg)
Cybersecurity, emerging technology and systemic risk: What it means for the medical device industry?
In late 2020, the World Economic Forum stated that “the approach to cybersecurity needs to be overhauled before the industry finds itself in any fit state to tackle the …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/17081348/table-idea-400x200.jpg)
Three smart ways SMBs can improve cybersecurity
Most of us wouldn’t automatically equate small to medium-size businesses (SMBs) with having the most stringent security strategies. For starters, they don’t exactly operate …
![passwordless](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/19132738/passwordless-400x200.jpg)
Why passwordless is not always passwordless
The concept of passwordless authentication has been gathering steam. Gartner anticipates that by 2022, 60% of large and global enterprises will implement some sort of …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
How to glean user insight while respecting personal privacy
While each person has a unique personality and identity, the digital world has no patience for individuality. The web tries with its every fiber to store, analyze, and …
![endpoint protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/23100505/endpoint-protection-400x200.jpg)
Endpoint security: How to shore up practices for a safer remote enterprise
It’s a long-held belief that enterprise IT teams are overworked. It’s also considered common knowledge that their jobs have only gotten harder in the days since workforces …
![Code](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/10182058/code-glasses-400x200.jpg)
The basics of security code review
With staffing ratios often more than 200 developers for every AppSec professional, scaling security requires increasing the developer’s engagement in securing the product. To …
![time](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09102304/time-400x200.jpg)
Security doesn’t always require immediacy
New security threats emerge almost continuously, meaning we now deal with a known unknown. In the past year alone, malware and ransomware use has sharply increased, 43% of …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094431/open-400x200.png)
University of Minnesota researchers fail to understand consent
You’d think with all the recent discussion about consent, researchers would more carefully observe ethical boundaries. Yet, a group of researchers from the University of …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095434/industrial-400x200.jpg)
Identifying and addressing critical OT asset vulnerabilities in 24/7 industrial operations
Cybersecurity is a race. A race that has for over a decade been extended to include systems that run the world’s industrial facilities, where a breach can compromise more than …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
Hackers are leveling up and catching healthcare off-guard
Remember when ransomware operators promised last year not to attack hospitals under siege from COVID-19? Unfortunately, that didn’t happen: hospitality, entertainment, …
![hardware](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093707/hardware2-400x200.jpg)
Hiring remote software developers: How to spot the cheaters
For the past year, moving to an all-remote workforce has often been positioned as a silver lining to the pandemic. Software engineers, in particular, reported a better …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?