![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094155/keyboard2-400x200.jpg)
The dynamic of modern security challenges: Issues security leaders face today
We sat down with Neil Weicher, CTO & Founder, NetLib Security, to discuss encryption technologies, the threat of legacy applications, the complexity of cloud security, …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100033/industrial-400x200.jpg)
The need for scalable OT security
As manufacturers and other industrial network owners are becoming more security conscious, they are coming up against security performance issues. Operational Technology (OT) …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094216/brain-400x200.jpg)
How AI can improve user experience and security for the finance industry
For the last 50 years, the fundamental and largely unchanged model for identifying and authenticating users has been based on the combination of a username and password, …
![Face paint](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093830/face_paint-400x200.jpg)
Tricking attackers through the art of deception
In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking …
![Healthcare IoT](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093856/heathcare-iot-400x200.jpg)
Healthcare’s blind spot: Unmanaged IoT and medical devices
From imaging to monitoring systems, infusion pumps to therapeutic lasers and life support machines, medical devices are used to improve and streamline patient care. Many of …
![editor](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101601/editor2-400x200.jpg)
Securing modern web apps: A case for framework-aware SAST
If you were to write a web application entirely by yourself, it would be a rather daunting task. You would need to write the UI elements from lower-level APIs, set up and …
![burn](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110748/burn-400x200.jpg)
How DNS firewalls can burn security teams
It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not even that. The …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
True passwordless authentication is still quite a while away
The password has been one of the great inventions in the history of computing: a solution that allowed simple and effective identity and access management when the need arose …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094122/5G-2-400x200.jpg)
The true potential of 5G for businesses
Technology is transforming our world beyond recognition and both public and private sector organizations are at a tipping point where they must embrace digital transformation …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093932/lock-400x200.jpg)
The importance of hardening firmware security
It’s no secret that attackers traditionally go after low-hanging fruit when hacking a system. Historically, this has meant targeting user applications, and, for deeper …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094026/eye-400x200.jpg)
Avoiding a biometric dystopia
In part one of our two-part series, we explored how biometric authentication methods are being defeated. In the second part, we’ll explore how manipulating biometrics can …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095434/industrial-400x200.jpg)
IIoT risks of relying heavily on edge computing
The sheer volume of data created by the Internet of Things (IoT) is increasing dramatically as the world is becoming progressively more connected. There is projected to be a …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege