Please turn on your JavaScript for this page to function normally.
Approved
Delivering visibility requires a new approach for SecOps

As the world watches the conflict with Russia unfold, cybersecurity defenders are working overtime. Defenders are being asked by key stakeholders, boards, and even CISA for …

snake, threat
Know the dangers you’re facing: 4 notable TTPs used by cybercriminals worldwide

In this Help Net Security video, Dmitry Bestuzhev, Most Distinguished Threat Researcher at BlackBerry, talks about some of the most interesting tactics, techniques, and …

bomb
Economic strife fuels cyber anxiety

The 2022 SonicWall Threat Mindset Survey found that 66% of customers are more concerned about cyberattacks in 2022, with the main threat being focused on financially motivated …

people
After a cyber breach, companies risk losing employees’ trust

54% of office workers would reconsider working for a company that had recently experienced a cyber breach, according to a study by Encore. An independent study of 100 C-level …

AI
Mitigating the risks of artificial intelligence compromise

The number of cyberattacks directed at artificial intelligence (AI) continues to increase, and hackers are no longer planting malicious bugs within code – their …

Ghostwriter
Ghostwriter: Open-source project management platform for pentesters

In this Help Net Security video, Christopher Maddalena, Director of Internal and Community Product at SpecterOps, showcases Ghostwriter, which helps you manage clients, …

Person
Why dark data is a growing danger for corporations

Dark data is data that a company has collected but no longer needs — ranging from outdated customer information to old employee records. This data type is often forgotten and …

cybersecurity jobs
Cybersecurity’s importance and impact reaches all levels of the tech workforce

Employer demand for cybersecurity professionals continues to strain talent availability, according to new data from CyberSeek. For the 12-month period ending in September …

phishing
DHL takes top spot in brand phishing attempts

Check Point Research has published its Brand Phishing Report for Q3 2022, which highlights the brands which were most frequently imitated by criminals in their attempts to …

Cynet guidebook
Cloud security made simple in new guidebook for lean teams

Cloud computing was the lifeline that kept many companies running during the pandemic. But it was a classic case of medicine that comes with serious side effects. Having …

people
Fill the cybersecurity talent gap with inquisitive job candidates

The impact of the Great Resignation and the Great Reshuffle is still strongly felt across many industries, including cybersecurity. There is a talent gap: Companies are …

lock
What consumers expect from organizations that handle their personal data

In this Help Net Security video, Robert Waitman, Privacy Director and Head of Privacy Research Program at Cisco, discusses the key findings of Cisco’s 2022 Consumer …

Don't miss

Cybersecurity news