![CI/CD pipelines](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/28103505/ci_cd-400x200.jpg)
How CISOs can safeguard security in CI/CD environments
DevOps is a staple at every forward-thinking organization these days. The agile development and release formula helps companies address customer issues and marketplace …
![fraud detection](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/14134048/fraud_detection-400x200.jpg)
What type of fraud enables attackers to make a living?
A consumer’s online account where they login and input their passwords is a very lucrative target for cybercriminals. In this Help Net Security video, David Senecal, VP …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27135755/attacks-fire-400x200.jpg)
How merchants can defend themselves against Magecart attacks
In this Help Net Security video, Angel Grant, VP of Security, F5, explains what Magecart attacks are and how they have evolved over the years. Grant illustrates how …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100033/industrial-400x200.jpg)
Why smart factories need to prioritize cybersecurity
Recent Capgemini research revealed that the vast majority of organizations do not have device visibility at their smart factory locations. The use of legacy machinery, …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/11111202/lock-400x200.jpg)
Overcoming the roadblocks to passwordless authentication
It’s a well-known fact that humans are the weakest link in any security strategy. Verizon’s latest annual data breach report found that over 80% of breaches in the “Basic Web …
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092731/microsoft-active-directory-400x200.jpg)
Why organizations should control Active Directory permissions
In this Help Net Security video, Matthew Vinton, Strategic Systems Consultant at Quest Software, illustrates the importance of regularly analyzing, controlling and adapting …
![Java](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/15105341/java-blocks-400x200.jpg)
How to manage the intersection of Java, security and DevOps at a low complexity cost
In this Help Net Security video, Erik Costlow, Senior Director of Product Management at Azul, talks about Java centric vulnerabilities and the headache they have become for …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
Implementing zero trust for a secure hybrid working enterprise
In this Help Net Security video, Kevin Peterson, Cybersecurity Strategist at Xalient, provides an overview of the early days of zero trust, illustrates where we are today, and …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
Identity is the killer context: 4 ways to stay in control
The COVID-19 pandemic sounded the death knell for the traditional perimeter. Work is now an activity, not a place, meaning the concept of an encircling wall of security is as …
![Marc Castejon](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/29052421/marc_castejon-2-silent_breach-400x200.jpg)
Understanding your attack surface is key to recognizing what you are defending
In this interview with Help Net Security, Marc Castejon, CEO at Silent Breach, discusses what organizations should be worried about at the moment, and what technologies they …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
6 ways your cloud data security policies are slowing innovation – and how to avoid that
As practically every organization shifts from managing their data in network-based data centers to storing it in the cloud, cloud data security policies are created to secure …
![Christopher Sestito](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/20110155/christopher_sestito-2-hidden_layer-400x200.jpg)
Machine learning creates a new attack surface requiring specialized defenses
Machine learning (ML) inputs and outputs are becoming more widely available to customers thanks to organizations in almost every sector integrating artificial intelligence …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints