Please turn on your JavaScript for this page to function normally.
Adam Bateman
Balancing usability and security in the fight against identity-based attacks

In this Help Net Security interview, Adam Bateman, CEO of Push Security, talks about the rise in identity-based attacks, how they’re becoming more sophisticated each year, and …

Mel Morris
Using cognitive diversity for stronger, smarter cyber defense

In this Help Net Security interview, Mel Morris, CEO of Corpora.ai, discusses how cognitive biases affect decision-making during cybersecurity incidents. Morris shares …

Biohazard
Are threat feeds masking your biggest security blind spot?

Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those …

Liad Shnell
Choosing the right secure messaging app for your organization

In this Help Net Security interview, Liad Shnell, CTO at Rakuten Viber, discusses what organizations should look for in secure messaging apps, including encryption, privacy …

DNS
Cybercriminals hijack DNS to build stealth attack networks

Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, …

Buzz Hillestad
How AI will shape the next generation of cyber threats

In this Help Net Security interview, Buzz Hillestad, CISO at Prismatic, discusses how AI’s advancement reshapes cybercriminal skillsets and lowers entry barriers for …

quantum computing
How to fend off a quantum computer attack

In this Help Net Security video, IEEE member Marc Lijour explains quantum computing and offers insight into how to fend off a quantum computer attack.

Effective strategies for measuring and testing cyber resilience

In this Help Net Security interview, Detective Superintendent Ian Kirby, CEO of the National Cyber Resilience Centre Group (NCRCG), discusses the emerging cyber threats and …

Tim West
How ransomware tactics are shifting, and what it means for your business

In this Help Net Security interview, Tim West, Director of Threat Intelligence and Outreach at WithSecure, discusses Ransomware-as-a-Service (RaaS) with a focus on how these …

airplane
Cybercriminals capitalize on travel industry’s peak season

Cybercriminals are capitalizing on the travel and hospitality industry’s peak season, using increased traffic as cover for their attacks, according to Cequence Security. …

ransomware
Most ransomware attacks occur between 1 a.m. and 5 a.m.

There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies employed by cybercriminals that …

phishing
Cybercriminals exploit file sharing services to advance phishing attacks

Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according …

Don't miss

Cybersecurity news