cybersecurity
![Tazama](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/05155253/tazama-open_source-400x200.webp)
Tazama: Open-source real-time fraud management
Tazama is an open-source platform focused on improving fraud management within digital payment systems. Tazama marks a substantial transformation in the approach to financial …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/01152205/botnet-1400-3-400x200.jpg)
Major shifts in identity, ransomware, and critical infrastructure threat trends
In this Help Net Security video, Michelle Alvarez, Strategic Threat Analysis Manager at IBM X-Force, discusses the 2024 X-Force Threat Intelligence Index, revealing top …
![connections](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142123/computer-connections-400x200.jpg)
78% of MSPs identify cybersecurity as prime IT challenge
Cybersecurity remained a top priority and an area of growth for MSPs, with 73% saying it’s a top revenue driver for their business, according to Kaseya. Ongoing …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26142004/api1-400x200.jpg)
5 ways to keep API integrations secure
API integrations often handle sensitive data, such as employees’ personally identifiable information (PII), companies’ financial information, or even clients’ payment card …
![healthcare cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03091716/healthcare-cloud-400x200.jpg)
Navigating regulation challenges for protecting sensitive healthcare data
In this Help Net Security video, Chris Bowen, CISO at ClearDATA, emphasizes the importance of digital health companies being more transparent with their users. As more and …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165910/ai-person-400x200.png)
AI tools put companies at risk of data exfiltration
Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative AI (GenAI) only compounding the issue, indicating …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/11092828/lock-computer-blue-400x200.jpg)
Why cyber maturity assessment should become standard practice
Understanding risk is one thing, but how do you know if your organization has what it takes to withstand those risks being realized? Establishing cyber maturity can help …
![encrypted storage](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27151008/encrypted_storage-1400-400x200.webp)
Secure your hybrid workforce: The advantages of encrypted storage
In this Help Net Security video, Ryan Amparo, Field Application Engineer at Kingston Technology, discusses the benefits of encrypted external SSDs and USBs for hybrid …
![Kris Lovejoy](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16135002/kris_lovejoy-2-kyndryl-1-400x200.jpg)
What organizations need to know about the Digital Operational Resilience Act (DORA)
In this Help Net Security interview, Kris Lovejoy, Global Security and Resilience Leader at Kyndryl, discusses the impact of the Digital Operational Resilience Act (DORA) on …
![software bug](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/08155002/software_bug-400x200.jpg)
Organizations are knowingly releasing vulnerable applications
92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers …
![PyRIT](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25142811/pyrit-2-1400-400x200.jpg)
PyRIT: Open-source framework to find risks in generative AI systems
Python Risk Identification Tool (PyRIT) is Microsoft’s open-source automation framework that enables security professionals and machine learning engineers to find risks …
![supply chain](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/12152237/supply_chain-1400-400x200.jpg)
Integrating software supply chain security in DevSecOps CI/CD pipelines
NIST released its final guidelines for integrating software supply chain security in DevSecOps CI/CD pipelines (SP 800-204D). In this Help Net Security video, Henrik Plate, …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints