![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093803/cloud-drive1-400x200.jpg)
Cloud adoption and security are not mutually exclusive
As organizations continue to adopt cloud services to achieve their desired business objectives, many don’t realize that the thing that makes cloud computing great – …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094155/keyboard2-400x200.jpg)
The dynamic of modern security challenges: Issues security leaders face today
We sat down with Neil Weicher, CTO & Founder, NetLib Security, to discuss encryption technologies, the threat of legacy applications, the complexity of cloud security, …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093906/ai3-400x200.jpg)
The rise of biometrics and passwordless security
Whether you realize it or not, our current era of mobile and cloud computing can be defined, both positively and negatively, by shared secrets. Shared secrets — passwords, …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093759/arrow-400x200.jpg)
How to increase the efficiency of your risk and compliance management strategy
The rise of new business processes and the changing government rules and regulations around the globe are posing challenges for small and big companies alike, according to …
![SD-WAN](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093756/SD-WAN-400x200.png)
SD-WAN continues to be one of the fastest-growing segments of the network infrastructure market
The SD-WAN infrastructure market will grow at a 30.8% compound annual growth rate (CAGR) from 2018 to 2023 to reach $5.25 billion, according to IDC’s SD-WAN …
![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094044/fire-400x200.jpg)
Week in review: Crafty Office 365 phishing, how DNS firewalls can burn security teams
Here’s an overview of some of last week’s most interesting news and articles: Phishers targeting Office 365 admins have a new trick up their sleeve Phishers …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Ransomware attack leaves Johannesburg residents without electricity
A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power. While …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094316/person-1-400x200.jpg)
Damaging insider threats rise to new highs in the past year
70 percent of organizations are more frequently seeing insider attacks, with 60 percent experiencing one or more within the last 12 months, and 68 percent feeling “extremely …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100033/industrial-400x200.jpg)
The need for scalable OT security
As manufacturers and other industrial network owners are becoming more security conscious, they are coming up against security performance issues. Operational Technology (OT) …
![circle](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100231/circle-400x200.jpg)
New infosec products of the week: July 26, 2019
Centrify unveils free cloud-based PAM offering for organizations that do not have a password vault Centrify’s Free Tier Vault is available immediately in the AWS Marketplace, …
![Face](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101620/face-dark-400x200.jpg)
Current methods for anonymizing data leave individuals at risk of being re-identified
With the first large fines for breaching GDPR upon us, even anonymized datasets can be traced back to individuals using machine learning, researchers from University of …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094128/phishing-400x200.jpg)
Phishing is a billion-dollar global industry, consumers are the main target
Phishing is a growing pain point for individuals, businesses and CSPs, according to Allot. Consumers are the main target of these attacks, and they are calling for better …
Featured news
Sponsored
Don't miss
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)