Please turn on your JavaScript for this page to function normally.
lock
Breaking down data encryption techniques aimed at improving data privacy

In this Help Net Security video, Dana Morris, SVP Product and Engineering at Virtru, talks about privacy-preserving cryptography. He provides an introduction to data …

Sami Khoury
As trust in online spaces degrades, Canada bolsters resilience against cyber attacks

In this Help Net Security interview, Sami Khoury, Head of the Canadian Centre for Cyber Security, talks about how Canada is addressing today’s top threats, touches upon …

energy
Key cybersecurity trends in the energy sector

The key trends for the energy industry are about how we manage the future supply and demand challenges at a much more granular level than we are currently able to do. If …

biometrics
Balance reliable online age verification methods with data protection issues

Recently, California passed the California Age-Appropriate Design Code Act (CAADCA), a bill designed to protect children online. Although the bill has presented notable …

identity theft
Personal cybersecurity is now a company problem

As work and personal lives have almost merged into one, threat actors are increasingly targeting people because of their work lives, and cybersecurity needs to adapt to the …

threat modeling
What is software threat modeling and how to use it effectively

The importance of software threat modeling continues to grow. NIST advises software engineers to adhere to secure software development best practices and do software threat …

lock
Active security budget evaluation plugs holes in your security stack

Every successful attack has breached the security stack. Once the foundation of good cybersecurity, firewalls, and other security products are not enough to block all of the …

snake, threat
How geopolitical turmoil changed the cybersecurity threat landscape

ENISA, EU’s Agency for Cybersecurity, released its annual Threat Landscape report, covering the period from July 2021 up to July 2022. Cybersecurity threat landscape in …

lock
How to assess and mitigate complex supply chain risks

As cyber attackers increasingly look to capitalize on accelerating digitalization that has seen many enterprises significantly increase their reliance on cloud-based solutions …

Phishing
Phishing threats are increasingly convincing and evasive

In this Help Net Security video, Tonia Dudley, VP, CISO at Cofense, provides a look at the various changes seen in the phishing threat landscape. Dudley talks about the impact …

Alberto Yepez
Taking cybersecurity investments to the next level

Recently, the Forgepoint team announced a new alliance with global banking leader Santander to increase cyber investment worldwide, specifically in Europe, Israel, and Latin …

Jason Oberg
IoT cybersecurity is slowly gaining mainstream attention

In this interview for Help Net Security, Jason Oberg, CTO at Cycuity, talks about IoT devices cybersecurity, from production to usage, and how far have we come to securing …

Don't miss

Cybersecurity news