Features
![David Taylor](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/02155131/david_taylor_2-protiviti-400x200.jpg)
Ransomware attacks: The power of adaptation
The pandemic has had a major impact on almost every aspect of our society and left many organizations susceptible to increasingly sophisticated ransomware attacks. In this …
![containers](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095724/containers-400x200.jpg)
How do I select a container security solution for my business?
The adoption of container architectures is growing steadily, but security and compliance remain top concerns for enterprises, a recent survey revealed. To select a suitable …
![Maytal Brooks-Kempler](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/01115132/maytal_brooks_kempler_1-helena-400x200.jpg)
How getting a CISSP can change the course of a career
Technical certifications are increasingly in demand with 87% of IT employees possessing at least one and 40% pursuing their next, according to Questionmark. Despite …
![Baha Zeidan](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/01113801/baha_zeidan_2-azalea_health-1-400x200.jpg)
Healthcare cybersecurity under attack: How the pandemic affected rural hospitals
Ever since it started, the pandemic has greatly affected the overall threat landscape, with different organizations falling victims to cyberattacks. Understandably, those who …
![Joe Slowik](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/30155348/joe_slowik_2-gigamon-400x200.jpg)
Critical infrastructure today: Complex challenges and rising threats
Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity …
![hardware security](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/26095514/hardware-security-tools-400x200.jpg)
How do I select a hardware security module for my business?
Protecting your data has never been more important, and the best way to do it is by using encryption keys. These keys should then be stored inside a hardware security module …
![Chris Christou](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/31095300/chris_christou_2-booz_allen_hamilton-400x200.jpg)
Using zero trust to mitigate 5G security challenges
The total number of 5G connections will reach 3.2 billion by 2026, rising from 310 million in 2021, a study from Juniper Research has found. 45% of operators consider it …
![Peter Broadhurst](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/24102908/peter_broadhurst_2-inmarsat-400x200.jpg)
Cyber threats, passenger vessels and superyachts: The current state of play
In this interview with Help Net Security, Peter Broadhurst, Maritime Senior VP Safety, Security, Yachting and Passenger, Inmarsat, talks about the impact of cyber threats on …
![Doug Yeum](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/26091957/doug_yeum_2-aws-400x200.jpg)
Operationalize AWS security responsibilities in the cloud
In a sea of available MSSPs, organizations can find it hard to choose the one that can offer the right cloud security expertise. To make this decision easier, AWS has …
![Sachin Shah](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/24115816/sachin_shah_2-armis-400x200.jpg)
Trends in the OT/ICS security space and what’s to come
In July 2021, Armis appointed Sachin Shah, an Intel veteran of over 21 years, as its new CTO for Operational Technology (OT) and Industrial Control Systems (ICS). In this …
![Dave Wreski](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/23084930/dave_wreski_guardiandigital-large-400x200.jpg)
How to make email safe for business
When it comes to business communication, email is still king. Cybercriminals are aware of this fact, and they’re constantly perfecting their attacks to successfully …
![Ben King](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/20111805/ben_king_2_okta-400x200.jpg)
Hybrid work: How do you secure every identity on your network?
As organizations around the world continue optimizing their hybrid work environments, many are struggling to stay productive without compromising on security. In this …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints