Please turn on your JavaScript for this page to function normally.
hardware
Enterprises remain vulnerable through compromised API secrets

Cybersecurity professionals are frustrated over how much time and attention they must devote to API security and worried that their defenses still need to be improved, …

malware
Techniques that attackers use to trick victims into visiting malicious content

Businesses widely use cloud applications, a fact not lost on attackers, which view these apps as an ideal home for hosting malware and causing harm. In this Help Net Security …

cyber insurance
Cyber insurance can offset the risks of potential breaches

SMBs are aware of increasing cyber threats and allocating resources and investing in areas such as network and cloud security, according to Datto. Key takeaways from this …

Europe
EU cyber resilience regulation could translate into millions in fines

The EU Commission’s Cyber Resilience Act (CRA) is intended to close the digital fragmentation problem surrounding devices and systems with network connections – from …

fast
Global instability increases cyber risk, says World Economic Forum

Geopolitical instability is exacerbating the risk of catastrophic cyberattacks, according to the Global Cybersecurity Outlook 2023 report from the World Economic Forum. The …

world
Cybersecurity in 2023: Russian escalation, Chinese espionage, Iranian “hacktivism”

In 2022, state-sponsored cyber activity has been drawn into sharp focus, ransomware continued to dominate as the primary threat facing organizations, and there have been …

ChatGPT
Potential threats and sinister implications of ChatGPT

ChatGPT from OpenAI is a conversational chatbot recently released in preview mode for research purposes. It takes natural language as input and aims to solve problems, provide …

lock
How data protection is evolving in a digital world

Companies are challenged with more complex hybrid IT environments. They are raising budgets to fend off cyberattacks and keep up as production environments continue to …

shield
How to succeed in cyber crisis management and avoid a Tower of Babel

Although cyberattacks have become more common, handling them remains extremely challenging for organizations. Even if things go well on the technical level, incident response …

shark
Threats that will dominate headlines in 2023

In this Help Net Security video, MacKenzie Jackson, Developer Advocate at GitGuardian, offers his cybersecurity predictions for 2023. These include: Developers will be a …

hybrid work
Training, endpoint management reduce remote working cybersecurity risks

33% of companies are not providing any cybersecurity awareness training to users who work remotely, according to Hornetsecurity. The study also revealed that nearly 74% of …

password
Passkeys, going passwordless, and the future of authentication

There are a variety of roadblocks associated with moving to passwordless authentication. Foremost is that people hate change. End users push back when you ask them to abandon …

Don't miss

Cybersecurity news