strategy

Why traditional network perimeter security no longer protects
Greek philosopher Heraclitus said that the only constant in life is change. This philosophy holds true for securing enterprise network resources. Network security has been and …

Protecting hospitals to ensure patient safety, data confidentiality and business continuity
In this Help Net Security podcast, we’re joined by Leon Lerman, CEO of Cynerio, and Dr. John Halamka, emergency medicine physician and President of the Mayo Clinic …

Remote work in the time of COVID-19
The COVID-19 pandemic has, in one broad swipe, rewritten the rules regarding our workforce and jobs, with an almost instantaneous transition to remote work for those who were …

Five signs a virtual CISO makes sense for your organization
As today’s threat landscape continues to feature more sophisticated, well-funded, highly organized and increasingly complex cyber adversaries, defense and remediation …

How technology impacts building health
Employee health and safety have always been important, but the COVID-19 pandemic has made them more important than ever. Employers are concerned about the wellness of their …

How does COVID-19 impact cloud adoption?
99% of IT professionals worldwide indicated an impact on their business today related to the COVID-19 pandemic, a MariaDB survey reveals. The situation only slightly improves …

Digital transformation drives middle market resiliency
Digital transformation has tipped from buzzword to baseline in the middle market, and not a moment too soon. As the COVID-19 pandemic threatens the health of people and …

Cooking up secure code: A foolproof recipe for open source
The use of open source code in modern software has become nearly ubiquitous. It makes perfect sense: facing ever-increasing pressures to accelerate the rate at which new …

5G adoption, security and worldwide market trends
With 5G adoption ramping up all over the world, we sat down with Chris Pearson, President of 5G Americas, to learn more about the current 5G landscape. 5G Americas is an …

Lean into zero trust to ensure security in times of agility
Bad actors are rapidly mounting phishing campaigns, setting up malicious websites and sending malicious attachments to take full advantage of the pandemic and users’ need for …

How to successfully operationalize your micro-segmentation solution
Introducing a new security model into your existing infrastructure can be challenging. The task becomes even more daunting when starting with a new host-based or …

Not all IT budgets are being cut, some are increasing
At a high level—and contrary to conventional wisdom – not all IT budgets are being cut. Even with the economic challenges that COVID-19 has posed for businesses, almost …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025