![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
Zero Trust creator talks about implementation, misconceptions, strategy
A little over a decade ago, John Kindervag outlined the Zero Trust security model. As a VP and Principal Analyst on the Security and Risk Team at Forrester Research, he spent …
![Group-IB Threat Hunting Framework](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/01140238/group-ib-threat-hunting-framework-400x200.jpg)
Review: Group-IB Threat Hunting Framework
The IT infrastructure of larger organizations is very heterogeneous. They have endpoints, servers and mobile devices running various operating systems and accessing internal …
![mind map](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/30163653/mind_map-400x200.jpg)
MindAPI makes API security research and testing easier
Security researcher David Sopas has published a new open-source project: MindAPI, a mind map with resources for making API security research easier. “I love mind maps. …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093801/cloud-drive2-400x200.jpg)
58% of IT and security pros concerned about security in the cloud
The Cloud Security Alliance and AlgoSec published research which queried nearly 1,900 IT and security professionals from a variety of organization sizes and locations, sought …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
99% of security pros concerned about their IoT and IIoT security
Tripwire announced the results of a research report that assessed the security of connected devices across enterprise environments in 2021. Conducted by Dimensional Research, …
![LPWAN](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/29192218/lpwan-yellow-400x200.jpg)
The LPWAN market to reach $109.76 billion by 2025
The low-power wide area networks (LPWAN) market is expected to grow by $109.76 billion during 2021-2025, expanding at a CAGR of almost 58%, according to Technavio. The report …
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
Encryption is either secure or it’s not – there is no middle ground
The principle of end-to-end encryption underpins a system of communication where only the communicating users can read the messages. To this end, it exists to prevent any …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
We must crush digital misinformation before it destroys society
Digital communication is connecting people around the globe with tremendous benefits, but is also being misused in terrible ways that take advantage of the community. We are …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092933/insider_threat-1-400x200.jpg)
The impact of the CCPA on companies’ privacy practices
A new DataGrail report examined how millions of California consumers are exercising their privacy rights – to access their data, delete their data, and stop the sale of …
![SIM](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/29194856/sim-card-400x200.jpg)
Number of eSIMs installed in connected devices to reach 3.4B in 2025
The number of eSIMs installed in connected devices will increase from 1.2 billion in 2021, to 3.4 billion in 2025; representing growth of 180%, a Juniper Research study found. …
![Fraud losses](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/23150627/fraud_losses_red-400x200.jpg)
As online fraud rises, 72% of retail brands expect to grow fraud teams
Retailers around the world are increasing their fraud teams and budgets because of a significant rise in all types of online fraud during the pandemic, a research by Ravelin …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094615/week_in_review2-400x200.jpg)
Week in review: PHP supply chain attack, common zero trust traps, hardening CI/CD pipelines
Here’s an overview of some of last week’s most interesting news and articles: Attackers tried to insert backdoor into PHP source code The PHP development team has averted an …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about