![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093803/cloud-drive1-400x200.jpg)
Attacks growing in both scope and sophistication, exposing gaps in the cloud native toolchain
There’s a growing, organized and increasingly sophisticated pattern of attacks on cloud native infrastructure, according to Aqua Security. While most attacks were aimed …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094125/5G-400x200.jpg)
Five critical success factors for the 5G economy
Policymakers should focus on five critical success factors in order to ensure the US continues to build its emerging 5G economy, according to a report from Boston Consulting …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
In uncertain times, CISOs have a golden opportunity
Hackers are targeting everyone and taking advantage of fear, uncertainty, and a 24/7 news cycle that can dwell on a single theme for weeks on end. The victim pool includes …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093404/money-400x200.jpg)
Cyber losses are increasing in frequency and severity
Cyber attacks have increased in number and severity since the onset of the pandemic. The changes organizations implemented to facilitate remote work have given cybercriminals …
![telehealth](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/17141716/doctor-laptop-telehealth-400x200.jpg)
Telehealth is healthcare industry’s biggest cybersecurity risk
While COVID-19 has proven the healthcare industry’s overall resilience, it has also increased its cybersecurity risk with new and emerging threats. The rapid adoption …
![server](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100814/server-400x200.jpg)
Database monitoring improves DevOps success for financial services orgs
The financial services sector is outperforming other industries, both in its adoption of database DevOps, and its use of monitoring to track database performance and …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/06094247/5g-earth-400x200.jpg)
Emerging countries will adopt 5G faster than expected
Emerging markets have always been behind developed countries in adopting the latest generation mobile networks, with a few exceptions. While it would be safe to assume that …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102804/hands-400x200.jpg)
Week in review: PAN-OS flaws, securing AD accounts against password-based attacks
Here’s an overview of some of last week’s most interesting news, interviews and articles: Popular Android apps are rife with cryptographic vulnerabilities Columbia …
![Zoom 2FA](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/11102527/zoom-2fa-add-400x200.jpg)
How to add 2FA to your Zoom account
Video conferencing platform Zoom is finally offering all users the option to enable two-factor authentication (2FA) to secure their accounts against credential stuffing …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102423/network-400x200.jpg)
Four ways network traffic analysis benefits security teams
The march towards digital transformation and the increasing volume of cyberattacks are finally driving IT security and network teams towards better collaboration. This idea …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
Ensuring cyber awareness in the healthcare sector
As a result of the COVID-19 pandemic, healthcare professionals have increased their reliance on the internet to carry out their job. From connectivity with patients, to the …
![World](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/12192712/world-lines-red-400x200.jpg)
How does XDR improve enterprise security in the face of evolving threats?
Cybercriminals will never run out of ways to breach the security protocols enterprises put in place. As security systems upgrade their defenses, attackers also level up their …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege