cybersecurity
![Robin Long](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/06115347/robin_long-2-kiowa_security-400x200.jpg)
Key strategies for ISO 27001 compliance adoption
In this Help Net Security interview, Robin Long, founder of Kiowa Security, shares insights on how best to approach the implementation of the ISO/IEC 27001 information …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/01101255/compliance1-400x200.jpg)
Cybersecurity teams recognized as key enablers of business goals
97% of office workers across the UK and US trust their cybersecurity team’s ability to prevent or minimize damage from cyberattacks, according to CybSafe. The study examining …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28085702/privacy-400x200.jpg)
How companies are misjudging their data privacy preparedness
In this Help Net Security video, Karen Schuler, Global Privacy & Data Protection Chair at BDO, discusses overconfidence in data privacy and data protection practices. …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28143243/privacy2-400x200.jpg)
How AI is revolutionizing identity fraud
Nearly half of businesses reported a growth in synthetic identity fraud, while biometric spoofs and counterfeit ID fraud attempts also increased, according to AuthenticID. …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143233/cyber-threat2-400x200.jpg)
10 tips for creating your security hackathon playbook
For more than 12 years, I’ve been organizing and running hackathons with the goal of finding security vulnerabilities and fixing them before a product hits the market. These …
![Anya Shpilman](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/31122017/anya_shpilman-2-wdigital-400x200.jpg)
Choosing the right partner when outsourcing cybersecurity
In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential risks of outsourcing …
![OAuth](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/31115152/oauth1-400x200.jpg)
How threat actors abuse OAuth apps
OAuth apps have become prominent in several attack groups’ TTPs in recent years. OAuth apps are used for every part of the attack process. In this Help Net Security …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/01152202/botnet-1400-2-400x200.jpg)
As-a-Service tools empower criminals with limited tech skills
As-a-service attacks continue to dominate the threat landscape, with Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools making up the majority of malicious …
![Prowler](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/30191407/prowler-2-1400-400x200.jpg)
Prowler: Open-source security tool for AWS, Google Cloud Platform, Azure
Prowler is an open-source security tool designed to assess, audit, and enhance the security of AWS, GCP, and Azure. It’s also equipped for incident response, continuous …
![Jamieson O'Reilly](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16114229/jamieson-oreilly-2-dvuln-400x200.jpg)
Enhancing adversary simulations: Learn the business to attack the business
In this Help Net Security interview, Jamieson O’Reilly, Founder of DVULN, discusses adversary simulations, shedding light on challenges rooted in human behavior, …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093232/shield1-400x200.jpg)
Demystifying SOC-as-a-Service (SOCaaS)
Threat actors aren’t looking for companies of specific sizes or industries, they are looking for opportunities. Given that many companies operate in the dark and overlook …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143233/cyber-threat2-400x200.jpg)
Cybersecurity teams hesitate to use automation in TDIR workflows
Despite reported threat detection, investigation, and response (TDIR) improvements in security operations, more than half of organizations still experienced significant …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints