![Money](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101402/money-clip-400x200.jpg)
Advanced persistent threat protection market to grow steadily by 2026
Amid the COVID-19 crisis, the global market for advanced persistent threat protection estimated at $8 billion in the year 2020, is projected to reach a revised size of $20.3 …
![Realtek](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/16122316/realtek-082021-400x200.jpg)
Realtek SDK vulnerability exploitation attempts detected (CVE-2021-35395)
Threat actors are attempting to exploit CVE-2021-35395, a group of vulnerabilities in the web interface of the Realtek SDK, to spread Mirai malware to vulnerable IoT devices. …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27090527/ransomware-yellow-400x200.jpg)
Three reasons why ransomware recovery requires packet data
Data from SonicWall’s 2021 Cyber Threat Report showed more ransomware attacks in the first half of 2021 than in all of 2020. Much of the recent conversation around ransomware …
![Healthcare IoT](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093856/heathcare-iot-400x200.jpg)
What is the HIPAA Security Rule? Three safeguards to have in place
The past year has catalyzed a new era of healthcare, one where telehealth visits increased as we relied on online communication to keep ourselves informed and healthy. With …
![Kubescape](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/20111808/kubescape_2021-400x200.jpg)
Kubescape helps admins manage Kubernetes securely
Kubescape is an open-source tool for testing if Kubernetes is deployed securely, as defined in the recently released Kubernetes Hardening Guidance by NSA and CISA. About …
![red teaming](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093618/red_teaming-400x200.jpg)
How do I select an automated red teaming solution for my business?
Red teaming is an essential part of an organization’s security assessment process. It is generally done manually to uncover possibile vulnerabilities and security gaps, …
![container](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102319/container-400x200.jpg)
Security and compliance still a challenge for container architectures
While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …
![sharing](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101707/sharing-400x200.jpg)
Adverse security implications of enterprises network overprovisioning
Accedian released a research study examining the adverse security implications of network overprovisioning in enterprises and the common practices and concerns surrounding it. …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092859/iot-400x200.jpg)
IoT market to reach $1.5 trillion by 2027, security top priority
Driven by increased adoption of smart sensors integrated into connected devices, the Internet of Things (IoT) market segment is projected to reach $1.5 trillion by 2027. These …
![Microsoft Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/23115505/microsoft_exchange-ice-hns-400x200.jpg)
ProxyShell vulnerabilities actively exploited to deliver web shells and ransomware
Three so-called “ProxyShell” vulnerabilities are being actively exploited by various attackers to compromise Microsoft Exchange servers around the world, the …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
Why automated pentesting won’t fix the cybersecurity skills gap
The modern threat landscape is an enormous challenge for the modern enterprise. Many organizations are “addressing” this by buying the newest security products from the latest …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095943/cloud-400x200.jpg)
Things that are easy to miss in the race towards hybrid working and the cloud
The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …
Featured news
Sponsored
Don't miss
- The changes in the cyber threat landscape in the last 12 months
- The CISO’s approach to AI: Balancing transformation with trust
- 10 fintech companies to watch in 2024
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data