![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101802/office365-400x200.jpg)
How to protect Office 365 data from ransomware attacks
Given the broad scope of services Microsoft Office 365 provides, it’s no surprise it has become one of the company’s fastest growing revenue streams. Widespread …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102617/phishing-400x200.jpg)
Which phishing messages have a near 100% click rate?
Training employees to spot phishing emails, messages and phone calls can’t be done just once or once a year if the organization wants to see click rates decrease. For …
![Laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104809/laptop-dark-400x200.jpg)
Email inboxes still the weakest link in security perimeters
Over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to F-Secure. Types of attacks The single most …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111153/future-400x200.jpg)
What if defenders could see the future? Many clues are out there
Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
How organizations are confronting escalating third-party cyber risk
Based on in-depth interviews with security executives from 30 participating organizations across multiple industries, RiskRecon revealed how companies are managing the …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104249/industry-400x200.jpeg)
Expected changes in IT/OT convergence and industrial security
Ten years ago, I was brought into the industrial security arena by a top company executive in who was convinced that we needed traditional endpoint protection on smart meters. …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102945/question-400x200.jpg)
The four myths hampering cybersecurity maturity
We’ve seen tremendous advances in technology over the last 15 years or so, but security continues to struggle as much today as it did a decade ago. A large part of the …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
Discover hidden cybersecurity talent to solve your hiring crisis
Not having access to technical talent is a common complaint in the cybersecurity world. Folks with security experience on their resumes are in such high demand, CISOs need to …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102540/GDPR-400x200.jpg)
GDPR quick guide: Why non-compliance could cost you big
If you conduct business in the EU, offer goods or services to, or monitor the online behavior of EU citizens, then the clock is ticking. You only have a few more months …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101815/spotlight-400x200.jpg)
7 steps security leaders can take to deal with Spectre and Meltdown
Security and risk management leaders must take a pragmatic and risk-based approach to the ongoing threats posed by an entirely new class of vulnerabilities, according to …
![fence](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101822/fence-400x200.jpg)
Why do we need a risk-based approach to authentication?
20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the …
![envelope](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101834/envelope-400x200.jpg)
Love letters from a Black Hat to all the fools on the Internet
As an underground, “black hat” hacker, I don’t have time for significant others. I’m too busy earning stacks of cash to improve my Bitcoin mining rigs …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?