Please turn on your JavaScript for this page to function normally.
Microsoft 365
How hardening Microsoft 365 tenants mitigates potential cloud attacks

Moving critical data and workloads to the cloud has significantly changed information security teams. But most don’t have the resources to be successful in their cloud attack …

free online cybersecurity courses
5 free online cybersecurity courses you should check out

Cryptography In this course, you’ll learn how to protect information to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will develop a …

cybersecurity investments
Security investments that help companies navigate the macroeconomic climate

As data transformation progresses, cyber attacks are among the most significant growing threats to the enterprise. As seen in the recent MOVEit situation, enterprises must …

DevOps
Understanding the interplay between DevOps productivity and security

Not only are macroeconomic headwinds causing more significant stress for security and DevOps teams, but the increasing number of threats against shrinking teams is causing an …

money
Increased spending doesn’t translate to improved cybersecurity posture

Security teams are stretched, with not enough people, skills or budget to cope with all their priorities, according to Panaseer. Average cybersecurity budgets increase in 2023 …

dev
The limitations of shifting left in application security

In this Help Net Security video, Jacob Garrison, Security Research for Bionic, explains the limitations of shifting left in application security. Key factors hindering the …

U.S. Executive Order 14028
How to simplify the process of compliance with U.S. Executive Order 14028

In this Help Net Security video, Nick Mistry, SVP and CISO at Lineaje, offers tips to simplify the process of compliance with U.S. Executive Order 14028. A key part of U.S. …

hands
Three cybersecurity actions that make a difference

Organizations that closely align their cybersecurity programs to business objectives are 18% more likely to achieve target revenue growth and market share and improve customer …

energy
How cybercriminals target energy companies

In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses how cybercriminals employ specialized strategies when targeting …

cybersecurity team
Enhancing security team capabilities in tough economic times

According to ESG, 70% of cybersecurity pros expect budget cuts or freezes this year, which, in turn, will trigger project delays and greater vendor scrutiny. Understaffing and …

quantum computing
Quantum computing’s threat to national security

In this Help Net Security video, Denis Mandich, CTO at Qrypt, talks about quantum computing. If we thought AI turned security and privacy on their head, quantum computing will …

Ken Briggs
Building a culture of security awareness in healthcare begins with leadership

With the rise of modern trends such as cloud computing and remote work, healthcare institutions strive to balance accessibility, convenience, and robust security. In this Help …

Don't miss

Cybersecurity news