Please turn on your JavaScript for this page to function normally.
CI/CD pipelines
How CISOs can safeguard security in CI/CD environments

DevOps is a staple at every forward-thinking organization these days. The agile development and release formula helps companies address customer issues and marketplace …

fraud detection
What type of fraud enables attackers to make a living?

A consumer’s online account where they login and input their passwords is a very lucrative target for cybercriminals. In this Help Net Security video, David Senecal, VP …

attacks
How merchants can defend themselves against Magecart attacks

In this Help Net Security video, Angel Grant, VP of Security, F5, explains what Magecart attacks are and how they have evolved over the years. Grant illustrates how …

industrial
Why smart factories need to prioritize cybersecurity

Recent Capgemini research revealed that the vast majority of organizations do not have device visibility at their smart factory locations. The use of legacy machinery, …

lock
Overcoming the roadblocks to passwordless authentication

It’s a well-known fact that humans are the weakest link in any security strategy. Verizon’s latest annual data breach report found that over 80% of breaches in the “Basic Web …

Active Directory
Why organizations should control Active Directory permissions

In this Help Net Security video, Matthew Vinton, Strategic Systems Consultant at Quest Software, illustrates the importance of regularly analyzing, controlling and adapting …

Java
How to manage the intersection of Java, security and DevOps at a low complexity cost

In this Help Net Security video, Erik Costlow, Senior Director of Product Management at Azul, talks about Java centric vulnerabilities and the headache they have become for …

zero trust
Implementing zero trust for a secure hybrid working enterprise

In this Help Net Security video, Kevin Peterson, Cybersecurity Strategist at Xalient, provides an overview of the early days of zero trust, illustrates where we are today, and …

identity
Identity is the killer context: 4 ways to stay in control

The COVID-19 pandemic sounded the death knell for the traditional perimeter. Work is now an activity, not a place, meaning the concept of an encircling wall of security is as …

Marc Castejon
Understanding your attack surface is key to recognizing what you are defending

In this interview with Help Net Security, Marc Castejon, CEO at Silent Breach, discusses what organizations should be worried about at the moment, and what technologies they …

Business ideas
6 ways your cloud data security policies are slowing innovation – and how to avoid that

As practically every organization shifts from managing their data in network-based data centers to storing it in the cloud, cloud data security policies are created to secure …

Christopher Sestito
Machine learning creates a new attack surface requiring specialized defenses

Machine learning (ML) inputs and outputs are becoming more widely available to customers thanks to organizations in almost every sector integrating artificial intelligence …

Don't miss

Cybersecurity news