7 metrics to measure the effectiveness of your security operations
Given inflation and economic uncertainty, the cybersecurity industry is starting to experience budget cuts, despite a surge in ransomware attacks. As more budgets are going …
How Just-in-Time privilege elevation prevents data breaches and lateral movement
Are inadequate security policies for privileged access making you highly vulnerable to security breaches and ransomware attacks? In the weeks that followed the high-profile …
How BEC attacks on human capital management systems are increasing
In this Help Net Security video, Jon Hencinski, VP of Security Operations at Expel, talks about how their SOC team has recently observed Business Email Compromise (BEC) …
How to navigate payment regulations without compromising customer experience
As payment fraud increases, global losses are projected to reach $40.62 billion by 2027. Governments and businesses are turning to meaningful customer authentication to crack …
How CISOs can safeguard security in CI/CD environments
DevOps is a staple at every forward-thinking organization these days. The agile development and release formula helps companies address customer issues and marketplace …
What type of fraud enables attackers to make a living?
A consumer’s online account where they login and input their passwords is a very lucrative target for cybercriminals. In this Help Net Security video, David Senecal, VP …
How merchants can defend themselves against Magecart attacks
In this Help Net Security video, Angel Grant, VP of Security, F5, explains what Magecart attacks are and how they have evolved over the years. Grant illustrates how …
Why smart factories need to prioritize cybersecurity
Recent Capgemini research revealed that the vast majority of organizations do not have device visibility at their smart factory locations. The use of legacy machinery, …
Overcoming the roadblocks to passwordless authentication
It’s a well-known fact that humans are the weakest link in any security strategy. Verizon’s latest annual data breach report found that over 80% of breaches in the “Basic Web …
Why organizations should control Active Directory permissions
In this Help Net Security video, Matthew Vinton, Strategic Systems Consultant at Quest Software, illustrates the importance of regularly analyzing, controlling and adapting …
How to manage the intersection of Java, security and DevOps at a low complexity cost
In this Help Net Security video, Erik Costlow, Senior Director of Product Management at Azul, talks about Java centric vulnerabilities and the headache they have become for …
Implementing zero trust for a secure hybrid working enterprise
In this Help Net Security video, Kevin Peterson, Cybersecurity Strategist at Xalient, provides an overview of the early days of zero trust, illustrates where we are today, and …
Featured news
Resources
Don't miss
- Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950)
- GopherWhisper APT group hides command and control traffic in Slack and Discord
- A year in, Zoom’s CISO reflects on balancing security and business
- Scenario: Open-source framework for automated AI app red-teaming
- GDPR works, but only where someone enforces it