![lock](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/19122705/lock-silver-400x200.jpg)
The ripple effect: Why protection against supply chain attacks is a must
The SolarWinds attack continues to send ripples across the world of cybersecurity. For the uninitiated, this form of cyber attack was like a gradual spread of poison, and its …
![Tal Steinherz](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/25094549/tal_steinherz_2-wib-400x200.jpg)
API security awareness: The first step to better assessing the risk
In this Help Net Security interview, Tal Steinherz, CTO at Wib, talks about the importance of API security awareness and how to tackle numerous threats that are plaguing it. …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/12075527/ransomware-hands-400x200.jpg)
How to combat ransomware with visibility
In the first half of 2021, average ransomware demands surged by 518%, while payments climbed by 82%. There has been a growing number of attacks in healthcare, with 560 …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/20131001/lock-storm-security-400x200.jpg)
Implications of strengthening the cybersecurity of small business in America
On November 2, 2021, the House of Representatives passed two bills with the goal of strengthening the cybersecurity of small businesses in America. The first bill, the Small …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
Big salaries alone are not enough to hire good cybersecurity talent: What else can companies do?
Amid the severe and ongoing cyber skills shortages, both cybersecurity firms and in-house IT and cybersecurity departments are struggling to hire enough talented and qualified …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184920/biometrics1-400x200.jpg)
Behavioral biometrics: A promising tool for enhancing public safety
While globalization has enabled easy cross-border movement and transactions, fraudulent activities have, unfortunately, followed suit. The growing demand for a multi-layered …
![Cindy Blake](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/23115742/cindy_blake_2-gitlab-400x200.jpg)
Putting the “sec” in DevSecOps: An overall reduction of risk
In this Help Net Security interview, Cindy Blake, Senior Security Evangelist at GitLab, talks about the importance of integrating security in DevSecOps and how to overcome the …
![IoT connection](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104554/iot-connection-400x200.jpg)
Your supply chain: How and why network security and infrastructure matter
With digital transformation, the rapid adoption of cloud computing and the IoT, and the global scale of today’s supply chains, cybercriminals have more entry points to …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/18183052/numbers-box-400x200.jpg)
From fragmented encryption chaos to uniform data protection
Encryption is so critical to enterprise security that it’s almost like air: It’s a necessity, it’s everywhere, and we can’t live without it. On the surface, having encryption …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094431/open-400x200.png)
Securing open-source code supply chains may help prevent the next big cyberattack
The headline-making supply chain attack on SolarWinds late last year sent a shock wave through the security community and had many CISOs and security leaders asking: “Is my …
![HITB trainings](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/23075025/hitb_dr-silvio-cesare-class-400x200.jpg)
Why cybersecurity training needs a post-pandemic overhaul
COVID-19 may have ushered in the rise of remote work (either temporarily or permanently) but not all organizations were prepared to manage a fully remote workforce and the …
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/27113504/active_directory1-400x200.jpg)
Guarding against DCSync attacks
Gaining access to domain admin credentials is part of the endgame in many sophisticated attacks where threat actors are trying to maintain persistence. One of the ways that …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?