Please turn on your JavaScript for this page to function normally.
Devin Redmond
Tackling the dangers of internal communications: What can companies do?

In this interview for Help Net Security, Devin Redmond, CEO at Theta Lake, talks about the risk of internal communications and what companies can do to keep themselves safe. …

1 in 3 employees don’t understand why cybersecurity is important

According to a new Tessian report, 30% employees do not think they personally play a role in maintaining their company’s cybersecurity posture. What’s more, only 39% of …

People
People are the primary attack vector around the world

With an unprecedented number of employees now working in hybrid or fully remote environments, compounded by an increase in cyber threats and a more overwhelmed, COVID-19 …

Microsoft Office
Microsoft Office apps are vulnerable to IDN homograph attacks

Microsoft Office apps – including Outlook – are vulnerable to homograph attacks based on internationalized domain names (IDNs). In practice, this means that users …

vault
Future proofing: How companies can upgrade cyber defenses and be ready for tomorrow

Today’s threat landscape is constantly evolving. Threat actors and tactics are becoming more determined and advanced. In this video for Help Net Security, Jaspal Sawhney, …

analyst
How confident are CISOs about their security posture?

Proofpoint released its annual Voice of the CISO report, which explores key challenges facing chief information security officers (CISOs). While the world’s CISOs spent 2021 …

email
Email is the riskiest channel for data security

A research from Tessian and the Ponemon Institute reveals that nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the …

Spear phishing
Nothing personal: Training employees to identify a spear phishing attack

Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide …

password
Passwords are secrets that should never be shared

A weak password is one of the easiest way for attackers to steal valuable information about a person from their accounts, and then commit crimes with it. The stronger the …

drown
Leadership and recruitment changes needed to address burnout in cybersecurity

Most organizations—across almost every industry—have been forced to implement extensive digital components to their everyday operations so they can function efficiently. With …

Brent Johnson
Prioritizing cybersecurity training during the onboarding process

In this interview with Help Net Security, Brent Johnson, CISO at Bluefin, talks about the importance of making cybersecurity training a priority for every organization and why …

money
63% of organizations paid the ransom last year

A record 71% of organizations were impacted by successful ransomware attacks last year, according to a CyberEdge Group report, up from 55% in 2017. Of those that were …

Don't miss

Cybersecurity news