![Flavio Aggio](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/03134721/flavio_aggio_2-who-400x200.jpg)
World Health Organization CISO suggests a holistic approach to cybersecurity
Flavio Aggio, CISO at the World Health Organization, has had a challenging year. Since the onset of the COVID-19 pandemic, the WHO has become a significant target for …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/27174916/ransomware-hands-400x200.jpg)
SMBs increasingly vulnerable to ransomware, despite the perception they are too small to target
Acronis released a report which gives an in-depth review of the cyberthreat trends the company’s experts are tracking. The report warns that small and medium-sized …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093230/shield2-400x200.jpg)
Enterprises turning to cybersecurity providers to fight off cyberattacks
Enterprises in the U.S. are turning to cybersecurity providers offering best-of-breed technologies that can help them fend off cyberattacks from sophisticated criminals, …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
The value of PII and how it still fuels malign activities in the digital ecosystem
The COVID-19 pandemic engendered new vulnerabilities in the digital ecosystem for threat actors to exploit, resulting in items like vaccines, fraudulent vaccine certificates, …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092834/industrial-400x200.jpg)
Why ransomware is such a threat to critical infrastructure
A recent spike in large-scale ransomware attacks has highlighted the vulnerabilities in the nation’s critical infrastructure and the ease with which their systems can be …
![Kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093639/kubernetes-400x200.jpg)
How to harden Kubernetes systems and minimize risk
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released a report which details threats to Kubernetes environments and …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/20075020/risk-hand-400x200.jpg)
Most organizations are at an elevated risk of attack
The risk of cyberattacks has increased in the last year. According to a Trend Micro survey, 80% of global organizations report they are likely to experience a data breach that …
![hunt](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103025/soldier-400x200.jpg)
CyberCops program: ROTC students as future cybersecurity gatekeepers
Not so long ago, a strong password felt mighty enough to keep you safe and your computer data private. But we now live amid heightened risks in malware, phishing, …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105254/ddos_attacks-400x200.jpg)
Blocked DDoS attack volumes up, tech, healthcare and finance most targeted
Second quarter blocked DDoS attack volumes were up more than 40% compared to the same period in 2020, a Radware report reveals. The report provides an overview of DDoS attack …
![dark](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103342/dark-1-400x200.jpeg)
Cybercriminals are manipulating reality to reshape the modern threat landscape
VMware released a report which analyzes how cybercriminals are manipulating reality to reshape the modern threat landscape. The report found a drastic rise in destructive …
![Group-IB Digital Risk Protection](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/02095944/group-ib_digital_risk_protection-400x200.jpg)
Review: Group-IB Digital Risk Protection
The COVID-19 pandemic has transformed our private and working lives. It has also forced companies to extend the network perimeter due to employees working from their homes and …
![ENISA](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/19143001/enisa-clouds-400x200.jpg)
Supply chain attacks expected to multiply by 4 in 2021
Supply chain attacks have been a concern for cybersecurity experts for many years because the chain reaction triggered by one attack on a single supplier can compromise a …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints