Help Net Security
![Black Hat](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/11071838/blackhat-400x200.jpg)
Black Hat USA 2023 video walkthrough
Help Net Security is in Las Vegas this week for Black Hat USA 2023, and this video provides a closer look at the event. The exhibitors featured in this video are: 1Password, …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26142001/api3-400x200.jpg)
How to handle API sprawl and the security threat it poses
The proliferation of APIs has marked them as prime targets for malicious attackers. With recent reports indicating that API vulnerabilities are costing businesses billions of …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: August 11, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Adaptive Shield, LastPass, NetSPI, Solvo, ThreatConnect, and Vicarius. NetSPI …
![Black Hat](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/10152858/blackhat-usa-2023-entrance-400x200.jpg)
Photos: Black Hat USA 2023
Black Hat USA 2023 returned to the Mandalay Bay Convention Center in Las Vegas and Help Net Security was on-site. The conference featured over 100 selected Briefings, …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171231/malware-400x200.jpg)
Threat intelligence’s key role in mitigating malware threats
Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according to OPSWAT. Crucial role of threat …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/14133450/ddos-082022-400x200.jpg)
How to accelerate and access DDoS protection services using GRE
As we entered 2023, the cybersecurity landscape witnessed an increase in sophisticated, high-volume attacks, according to Gcore. The maximum attack power rose from 600 to 800 …
![smartphone](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/03125417/smartphone-bokeh2-400x200.png)
How executives’ personal devices threaten business security
Today, individual people – not businesses or government entities as a whole – are the primary targets, or entry points, for all major cyberattacks, according to …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/10134217/podcast-ntt-1200-400x200.jpg)
Cybersecurity as a global, multi-sector activity with Mihoko Matsubara
Like many leaders in the cybersecurity space, the professional journey of Mihoko Matsubara did not necessarily begin with securing devices or technology. However, once she …
![White House](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/24144037/whitehouse-design-400x200.jpg)
White House launches AI Cyber Challenge to make software more secure
The Biden-Harris Administration has launched a major two-year competition using AI to protect the United States’ most important software, such as code that helps run the …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133914/ai-robot-bot-400x200.jpg)
Will AI kill cybersecurity jobs?
Some ten years ago, the authors of The Second Machine Age wrote that “computers and other digital advances are doing for mental power—the ability to use our brains to …
![Shenny Sheth](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/21134024/shenny_sheth-2-centura-400x200.jpg)
Learning from past healthcare breaches to fortify future cybersecurity strategies
In the face of rising cyber threats, the healthcare sector has become a hotbed for cyberattacks. Given the gravity of this situation, we sat down with Shenny Sheth, Deputy …
![labyrinth](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105212/labyrinth-400x200.jpg)
What to know about FedRAMP Rev. 5 Baselines
In this Help Net Security video, Kaus Phaltankar, CEO at Caveonix, discusses how the recent approval of the FedRAMP Rev. 5 Baselines is a significant step forward in the cloud …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?