![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100112/healthcare-400x200.jpg)
Deploying pseudonymization techniques to protect health data
A report of the European Union Agency for Cybersecurity (ENISA) explores how pseudonymization techniques can help increase the protection of health data. The healthcare sector …
![fist](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093104/fist-400x200.jpg)
Why do organizations need to prioritize cyber resiliency?
OpenText announced a report which provides in-depth analysis, market insights, trend data, and predictions for what lies ahead as organizations move toward strengthening their …
![BYOD](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110841/byod-400x200.jpg)
BYOD and enterprise mobility market to reach $157.3 billion by 2026
Amid the COVID-19 crisis, the global market for BYOD and enterprise mobility estimated at $84.4 billion in the year 2022, is projected to reach a revised size of $157.3 …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/01150316/malware_1_01122021-400x200.jpg)
Mars Stealer malware pushed via Google Ads and phishing emails
Cybercriminals trying to foist the Mars Stealer malware onto users seemingly have a penchant for one particulat tactic: disguising it as legitimate, benign software to trick …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100013/user-400x200.jpg)
Web3 and the future of data portability: Rethinking user experiences and incentives on the internet
Tech conversations are now peppered with a new, contentious buzzword: Web3, and we’re all likely to hear a lot more of it in the coming years. It’s an umbrella term for …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/25143709/max_shuftan_2-sans-400x200.jpg)
How to recruit cybersecurity talent from atypical backgrounds
In this interview with Help Net Security, Max Shuftan, Director of Mission Programs & Partnerships at SANS Institute, talks about how companies and the cybersecurity …
![cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103021/cybersecurity-400x200.jpg)
Product showcase: Secure online authentication “Made in Germany” by Swissbit
New iShield FIDO2 USB-A / NFC security key protects access to applications and online services. Today it is more critical than ever before for businesses to equip themselves …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094816/insider_threat-400x200.jpg)
Posts on name-and-shame dark web leak sites climbed 85% in 2021
Ransomware payments hit new records in 2021 as cybercriminals increasingly turned to dark web leak sites where they pressured victims to pay up by threatening to release …
![hardware](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093705/hardware1-400x200.jpg)
The benefits of implementing continuous security in the development lifecycle
Wabbi published new research with IDG that finds companies utilizing continuous security have decreased vulnerabilities by 50%. The study focused on the integration of …
![apple](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104350/apple-400x200.jpg)
How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?
Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …
![DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093110/DevOps-1-400x200.jpg)
DevOps market to exceed $30 billion by 2028
The DevOps market is expected to surpass $30 billion by 2028, as reported in a research study by Global Market Insights. The growing demand to minimize system development …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095839/email-400x200.jpg)
IceID trojan delivered via hijacked email threads, compromised MS Exchange servers
A threat actor is exploiting vulnerable on-prem Microsoft Exchange servers and using hijacked email threads to deliver the IceID (BokBot) trojan without triggering email …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality