Please turn on your JavaScript for this page to function normally.
gears
What’s challenging development teams amid their race to the cloud?

Couchbase announced findings from industry research examining the challenges faced by development teams amid the race to the cloud and to execute on digital transformation …

money
CFOs’ overconfidence in cybersecurity can cost millions

Kroll announced its report Cyber Risk and CFOs: Over-Confidence is Costly which found chief financial officers (CFOs) to be woefully in the dark regarding cybersecurity, …

CIS Controls v8
CIS Critical Security Controls v8

The CIS Critical Security Controls (CIS Controls) are a prioritized set of safeguards to mitigate the most prevalent cyber-attacks against systems and networks. They are …

ransomware
A closer look at ransomware attack patterns

Barracuda released its fourth-annual threat research report which looks at ransomware attack patterns that occurred between August 2021 and July 2022. This Help Net Security …

zero
Modernizing data security with a zero trust approach to data access

In a world where we can no longer trust anyone, zero trust security has picked up momentum, especially since 2018 when NIST published Implementing a Zero Trust Architecture. …

fire
Reimagining the approach to incident response

Today’s harsh reality is that incident response based on manual efforts is no longer successful for security teams. Staying on top of thousands of daily security alerts …

Kali Linux books
5 Kali Linux books you should read this year

Kali Linux is a Linux distribution designed for digital forensics, penetration testing, security research, and reverse engineering. Here is a selection of books for different …

World
Organizations should fear misconfigurations more than vulnerabilities

Censys launched its State of the Internet Report, a holistic view into internet risks and organizations’ exposure to them. Through careful examination of which ports, …

fist
How prepared are organizations to tackle ransomware attacks?

HYCU has announced its State of Ransomware Preparedness report in partnership with ActualTech Media, which reveals that ransomware is an unavoidable risk for businesses, which …

burn
Outdated infrastructure remains a problem against sophisticated cyberattacks

A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage …

network
Financial organizations fail to act on firmware breaches

In this Help Net Security video, Michael Thelander, Director Product Marketing at Eclypsium, discusses how financial organizations are failing to act despite the majority …

bot
Bad bots are coming at APIs! How to beat the API bot attacks?

API or Application Programming Interface is a de facto building block for modern-day applications, necessary for both building and connecting applications and websites. But …

Don't miss

Cybersecurity news