Please turn on your JavaScript for this page to function normally.
businessman
Mobile app creation: Why data privacy and compliance should be at the forefront

In today’s mobile app landscape, providing customers with the most tailored and personal experience possible is essential to edging out competitors. But creating such a …

Fred Kneip
Third-party cloud providers: Expanding the attack surface

In this interview with Help Net Security, Fred Kneip, CEO at CyberGRX, talks about the lack of visibility into third-party risk, how to address this issue, and what companies …

zero trust
A zero-trust future: Why cybersecurity should be prioritized for the hybrid working world

The pandemic has had a significant impact on the way we work, and one of our recent research studies found that nearly 65% of companies expect some or all their workforce to …

Odin Olson
The impact of ransomware on cyber insurance driving the need for broader cybersecurity knowlege

The growing number of ransomware attacks has burdened many oganizations, but it has also greatly impacted the cyber insurance industry, which found itself having to cover …

shield
Protecting your company from fourth-party risk

In a world that is becoming ever more interconnected, organizations are learning firsthand that they are not only vulnerable to the adverse events that their vendors …

Phone
When a scammer calls: 3 strategies to protect customers from call spoofing

One of the first internet memes was born when The New Yorker published the now iconic cartoon captioned, “On the internet, no one knows you’re a dog.” Today we might update …

Shreekant Thakkar
The role of automation in staying on top of the evolving threat landscape

In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how …

syringe
Top tips for preventing SQL injection attacks

In the wake of the Colonial Pipeline attack and other high-profile cases, IT teams may be scrabbling to shore up their endpoint protection. But those in the developer …

David Taylor
Ransomware attacks: The power of adaptation

The pandemic has had a major impact on almost every aspect of our society and left many organizations susceptible to increasingly sophisticated ransomware attacks. In this …

Crypto exchanges and their customers must protect themselves as attacks continue

Within the past several years, cryptocurrency has gone from a niche hobby to a mainstream concern. Cryptocurrencies like Bitcoin, Ethereum, and even Dogecoin have generated …

WordPress
Securing your WordPress website against ransomware attacks

It’s no surprise to anyone who works in security that there’s been an explosion in ransomware incidents over the last two years, costing companies across various industries …

Maytal Brooks-Kempler
How getting a CISSP can change the course of a career

Technical certifications are increasingly in demand with 87% of IT employees possessing at least one and 40% pursuing their next, according to Questionmark. Despite …

Don't miss

Cybersecurity news