Please turn on your JavaScript for this page to function normally.
medical devices
Healthcare cybersecurity: How to prevent the compromise of patient records?

Year after year, the number of data breaches affecting entities in the healthcare industry rises, and 2020 was no exception. The 616 data breaches reported this past year to …

Fred Kneip
Third-party cloud providers: Expanding the attack surface

In this interview with Help Net Security, Fred Kneip, CEO at CyberGRX, talks about the lack of visibility into third-party risk, how to address this issue, and what companies …

Odin Olson
The impact of ransomware on cyber insurance driving the need for broader cybersecurity knowlege

The growing number of ransomware attacks has burdened many oganizations, but it has also greatly impacted the cyber insurance industry, which found itself having to cover …

Shreekant Thakkar
The role of automation in staying on top of the evolving threat landscape

In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how …

David Taylor
Ransomware attacks: The power of adaptation

The pandemic has had a major impact on almost every aspect of our society and left many organizations susceptible to increasingly sophisticated ransomware attacks. In this …

containers
How do I select a container security solution for my business?

The adoption of container architectures is growing steadily, but security and compliance remain top concerns for enterprises, a recent survey revealed. To select a suitable …

Maytal Brooks-Kempler
How getting a CISSP can change the course of a career

Technical certifications are increasingly in demand with 87% of IT employees possessing at least one and 40% pursuing their next, according to Questionmark. Despite …

Baha Zeidan
Healthcare cybersecurity under attack: How the pandemic affected rural hospitals

Ever since it started, the pandemic has greatly affected the overall threat landscape, with different organizations falling victims to cyberattacks. Understandably, those who …

Joe Slowik
Critical infrastructure today: Complex challenges and rising threats

Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity …

hardware security
How do I select a hardware security module for my business?

Protecting your data has never been more important, and the best way to do it is by using encryption keys. These keys should then be stored inside a hardware security module …

Chris Christou
Using zero trust to mitigate 5G security challenges

The total number of 5G connections will reach 3.2 billion by 2026, rising from 310 million in 2021, a study from Juniper Research has found. 45% of operators consider it …

Peter Broadhurst
Cyber threats, passenger vessels and superyachts: The current state of play

In this interview with Help Net Security, Peter Broadhurst, Maritime Senior VP Safety, Security, Yachting and Passenger, Inmarsat, talks about the impact of cyber threats on …

Don't miss

Cybersecurity news