Please turn on your JavaScript for this page to function normally.
BEC scams
Widespread BEC attacks threaten European organizations

European organizations experienced a greater volume and frequency of BEC attacks over the last year, as compared to organizations in the United States, according to Abnormal …

NetSPI ASM
A deep-dive demo of NetSPI’s Attack Surface Management (ASM) platform

Learn how NetSPI’s always-on solution allows companies to improve visibility, inventory, and understanding of known and unknown assets and exposures on their global …

Microsoft 365
How hardening Microsoft 365 tenants mitigates potential cloud attacks

Moving critical data and workloads to the cloud has significantly changed information security teams. But most don’t have the resources to be successful in their cloud attack …

free online cybersecurity courses
5 free online cybersecurity courses you should check out

Cryptography In this course, you’ll learn how to protect information to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will develop a …

honeypot
Uncovering attacker tactics through cloud honeypots

Attackers typically find exposed “secrets” – pieces of sensitive information that allow access to an enterprise cloud environment — in as little as two minutes and, in …

week in review
Week in review: Microsoft confirms DDoS attacks on M365 and Azure Portal, Infosecurity Europe 2023

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unraveling the multifaceted threats facing telecom companies In this Help Net …

zero trust
Operationalizing zero trust in the cloud

Some organizations have bought into the idea that workloads in the cloud are inherently more secure than those on premises. This idea is reinforced by the concept that the …

cybersecurity investments
Security investments that help companies navigate the macroeconomic climate

As data transformation progresses, cyber attacks are among the most significant growing threats to the enterprise. As seen in the recent MOVEit situation, enterprises must …

email
Insurance companies neglect basic email security

Only 3.54% of of insurance companies have correctly implemented basic phishing and spoofing protection, according to EasyDMARC. DMARC standard adoption Insurers operate using …

Infosecurity Europe 2023
Photos: Infosecurity Europe 2023, part 3

Infosecurity Europe is taking place at ExCeL London from 20-22 June 2023 and Help Net Security is on site. The first gallery is available here, and the second gallery is here. …

open source security
Cloud-native security hinges on open source

Technologies like Kubernetes and K3S are synonymous with the success of cloud native computing and the power of open source. It is no accident they have steamrolled the …

DevOps
Understanding the interplay between DevOps productivity and security

Not only are macroeconomic headwinds causing more significant stress for security and DevOps teams, but the increasing number of threats against shrinking teams is causing an …

Don't miss

Cybersecurity news