![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
The challenges of keeping a strong cloud security posture
It’s simple – you can’t secure what you can’t see or don’t know about. In this interview, Badri Raghunathan, Director of Product Management for Container and Serverless …
![NIST mask research](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/28114110/nist-facemask-research-400x200.jpg)
Face recognition software making progress at recognizing masked faces
A study of face recognition technology created after the onset of the COVID-19 pandemic shows that some software developers have made demonstrable progress at recognizing …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105618/cloud-400x200.jpg)
Cloud-native benefits stifled by critical security and networking issues
While most organizations today are using cloud-native apps, Kubernetes and microservices, they struggle to secure and connect the complex environments resulting from them, a …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110827/lights-400x200.jpg)
Network slicing market to reach $1,284 million by 2025
The global network slicing market size is projected to grow from $161 million in 2020 to $1,284 million by 2025, at a Compound Annual Growth Rate (CAGR) of 51.5% during the …
![](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/02131300/question-400x200.jpg)
Which security practices lead to best security outcomes?
A proactive technology refresh strategy and a well-integrated tech stack are, according to a recent Cisco report, two security practices that are more likely than many others …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/20075020/risk-hand-400x200.jpg)
The three stages of security risk reprioritization
What began as a two-week remote working environment, due to COVID-19 has now stretched past the nine-month mark for many. The impact of telework on organizations can be felt …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Cloud native security: A maturing and expanding arena
At the recent KubeCon + CloudNativeCon North America 2020, I had the opportunity to take part in a keynote panel with a number of other cloud native security practitioners. We …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111153/future-400x200.jpg)
IT leaders on 2021 opportunities, challenges and key technology trends
IEEE released the results of a survey of CIOs and CTOs in the U.S., U.K., China, India and Brazil regarding the most important technologies for 2021 overall, the impact of the …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
Consumers vastly misjudge the vulnerability of their home networks
Internet users in the United States vastly underestimate how often their home networks are targeted by cyber threats. That’s one of the key findings of a new Comcast report. …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095922/network1-400x200.jpg)
Demand for private network deployments will be driven by heavy industry verticals
With enterprise 5G maturing, the importance of private networks for the enterprise domain will continue to grow. According to ABI Research, the demand for private network …
![DNS](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/13101124/dns-yellow-400x200.jpg)
How prevalent is DNS spoofing? Could a repeat of the Dyn/Mirai DDoS attack have the same results?
Two separate groups of academics have recently released research papers based on research into the Domain Name System (DNS). One has found that the overwhelming majority of …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/17081348/table-idea-400x200.jpg)
Why microlearning is the key to cybersecurity education
Cyber attacks are on the rise during this year of uncertainty and chaos. Increased working from home, online shopping, and use of social platforms to stay connected and sane …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege