Help Net Security

Multi-access edge cloud market to grow steadily by 2025
IDC sees 2021 as an accelerated year for multi-access edge cloud (MEC) investments. MEC buildouts are being carried out by a broad cross-section of edge stakeholders (e.g., …

Webinar: How to secure your sensitive data in Elasticsearch
Is your Elasticsearch data protected from hackers and common attacks like search injections? Join data security expert and CEO of IronCore Labs Patrick Walsh on November 4th …

How to maximize your security budget while demonstrating ROI
The 2021 Positive Technologies Cybersecurity Threatscape report revealed that cyber attacks remain on the rise in the post-pandemic world, increasing by 17% compared to 2020. …

AWS ransomware attacks: Not a question of if, but when
Ermetic announced the results of a study about the security posture of AWS environments and their vulnerability to ransomware attacks. In virtually all of the participating …

2021 nastiest malware: Here to stay and ever evolving
This year was yet another year with COVID-19 and malware running rampant in the headlines. Be it in person or online, the world is still struggling in the fight against …

Database monitoring tools usage skyrocketing
79% of database professionals are now using either paid-for or in-house monitoring tools, a survey from Redgate Software has shown. This is an increase of 10 percentage points …

SaaS adoption growing, but so are security concerns
A BetterCloud survey of more than 500 IT and security professionals reveals the latest challenges of managing SaaS at scale, particularly as digital transformation catapulted …

5G healthcare market to reach $3.667 million by 2026
The 5G healthcare market is projected to reach $3.667 million by 2026, at a CAGR of 76.3% between 2021 and 2026, according to MarketsandMarkets. 5G stands for the fifth …

How to achieve CISSP cybersecurity certification
From the technical tools that help manage access control to non-technical skills like collaboration, learn about the fundamentals required in cybersecurity – and how CISSP …

Ransomware: Relationship breakdowns have never been so satisfying
Names such as Conti, Ryuk, Babuk, and Darkside have permeated into public consciousness, linked to disruptions of critical services worldwide. And with good measure, since the …

Strengthening firmware security with hardware RoT
Hackers are growing smarter and more sophisticated in their attempts to avoid detection. With IT security and visibility efforts still largely focused higher in the stack at …

Remote work exposing SMEs to increased cybersecurity risk
Remote working is leading to increased cybersecurity risks for SMEs, a research from ServerChoice shows. The research, conducted with 1,000 business leaders at SMEs, found …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)