Please turn on your JavaScript for this page to function normally.
USA
What $1B in cybersecurity funding can mean for US state, local governments

How do you best spend a cybersecurity budget you have long been hoping you’d get? That’s the question state, local, and territorial (SLT) governments are starting to ask …

social engineering
3 ways enterprises can mitigate social engineering risks

In this Help Net Security video, Alon Levin, VP of Product Management at Seraphic Security, explains what social engineering is, and how prevalent it is. He offers insight …

architecture
Tackling the weaknesses of smart buildings’ technology

Like any other innovation, the integration of IoT technology in smart buildings will bring benefits as well as more and newer risks. The market for smart building technologies …

skull binary
Shadow APIs hit with 5 billion malicious requests

Cequence Security released its first half 2022 report titled, “API Protection Report: Shadow APIs and API Abuse Explode.” Chief among the findings was approximately 5 billion …

People
Unearth offboarding risks before your employees say goodbye

Saying goodbye is never easy. That’s especially true when it comes to employee offboarding – but not due to sentimentality. In our increasingly digital workplace, …

face
The gap between security and privacy, and what it will take to bridge it

In this Help Net Security video, Bill Tolson, VP of eDiscovery & Compliance at Archive360, talks about the biggest and perhaps only question in information governance …

Terminal
APIs are quickly becoming the most popular attack vector

In this Help Net Security video, Shay Levi, CTO at Noname Security, discusses the findings from a recent API security report, which reveals a growing number of API security …

Eileen Walther
Fine-tuning Germany’s cybersecurity strategy

Recently, Eileen Walther, Northwave’s Country Manager for Germany and specialized in information security, was elected the new Vice President of the Cyber Security Council …

malware
This year’s biggest cyber threats

OpenText announced the Nastiest Malware of 2022, a ranking of the year’s biggest cyber threats. For the fifth year running, experts combed through the data, analysed different …

CIS Hardened Images
CIS Hardened Images on AWS Marketplace

Does your organization spend countless resources hardening operating systems in the cloud? That’s why CIS pre-hardens virtual machine (VM) images to CIS Benchmark …

Cyber attackers view smaller organizations as easier targets

Attackers view smaller organizations as having fewer security protocols in place, therefore requiring less effort to compromise. This Help Net Security video showcases how …

Dissect framework
Dissect: Open-source framework for collecting, analyzing forensic data

A game changer in cyber incident response, the Dissect framework enables data acquisition on thousands of systems within hours, regardless of the nature and size of the IT …

Don't miss

Cybersecurity news