Please turn on your JavaScript for this page to function normally.
safeguard crypto assets
The best ways to safeguard crypto assets

The mainstream emergence of cryptocurrency, coupled with its popularity among cybercriminals, has created a potentially dangerous environment for those with significant crypto …

skull binary
What could be the cause of growing API security incidents?

Noname Security announced the findings from its API security report, “The API Security Disconnect – API Security Trends in 2022”, which revealed a rapidly growing number of …

Building
SMBs vs. large enterprises: Not all compromises are created equal

Attackers view smaller organizations as having fewer security protocols in place, therefore requiring less effort to compromise. Lumu has found that compromise is …

hands
Agent-based vs. agentless security: Pros and cons

In this Help Net Security video, Mark Nunnikhoven, Distinguished Cloud Strategist at Lacework, discusses agent-based vs. agentless approaches in security. Ransomware is …

critical infrastructure
Is $15.6 billion enough to protect critical infrastructure?

Several bills totaling $15.6 billion are making their way through the House for the 2023 fiscal year. While $11.2 billion will go to the Department of Defense, $2.9 billion …

linux security courses
3 free Linux security training courses you can take right now

Linux Server Management and Security University of Colorado / Instructor: Greg Williams, Lecturer This course dives into how Linux works from an enterprise perspective: In …

data
The explosion of data is beyond human ability to manage

Dynatrace announced the results of an independent global survey of 1,303 CIOs and senior cloud and IT operations managers in large organizations, showing that as the move …

glasses
20/20 visibility is paramount to network security

Infoblox announced the results of a Forrester Consulting study, which found IT leaders around the world share a ubiquitous appetite for greater network visibility. The …

XDR
4 key takeaways from “XDR is the perfect solution for SMEs” webinar

Cyberattacks on large organizations dominate news headlines. So, you may be surprised to learn that small and medium enterprises (SMEs) are actually more frequent targets of …

macOS Ventura security
How to activate Lockdown Mode on macOS Ventura

Apple announced additional security and privacy updates for its newest operating system. In this Help Net Security video, you’ll learn how to activate Lockdown Mode on your …

data
Take cybersecurity out to where employees and data are coming together

Every morning, we wake up and chances are, we start immediately accessing and consuming information. Whether it’s accessing personal emails, downloading sales reports, or …

industry
The rise of attacks on critical infrastructure

A recent research found an increase in attacks across all the most targeted industries and organizations, including education, healthcare and finance. Attacks on critical …

Don't miss

Cybersecurity news