Please turn on your JavaScript for this page to function normally.
energy
How cybercriminals target energy companies

In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses how cybercriminals employ specialized strategies when targeting …

Island browser
What is a browser doing at Infosecurity Europe 2023?

What if the enterprise had complete control over the browser? What would it do for security, productivity, for work itself? Ari Yablok, Head Of Brand at Island, invites you to …

cybersecurity team
Enhancing security team capabilities in tough economic times

According to ESG, 70% of cybersecurity pros expect budget cuts or freezes this year, which, in turn, will trigger project delays and greater vendor scrutiny. Understaffing and …

NetSPI BAS
NetSPI Breach and Attack Simulation (BAS) platform demo

Only 20 percent of common attack behaviors are caught by EDR, SIEM, and MSSP out-of-the-box solutions. Contrary to what many BAS vendors and technology providers claim, 100% …

quantum computing
Quantum computing’s threat to national security

In this Help Net Security video, Denis Mandich, CTO at Qrypt, talks about quantum computing. If we thought AI turned security and privacy on their head, quantum computing will …

identity theft
Examining the long-term effects of data privacy violations

Regulatory bodies are taking potential data privacy violations much more seriously this year after a relatively quiet period that followed the enactment of regulations such as …

Creating A Small Business Cybersecurity Program
Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition

In this Help Net Security video interview, Alan Watkins, CIS Controls Ambassador, CIS, talks about his new book – Creating a Small Business Cybersecurity Program, Second …

AI
Embracing realistic simulations in cybersecurity training programs

In this Help Net Security video, Ed Adams, CEO of Security Innovation, discusses the shifts in cybersecurity training. 60% of companies now include realistic simulations in …

brain
Generative AI’s influence on data governance and compliance

In this Help Net Security video, Michael Rinehart, VP of Artificial Intelligence at Securiti.ai, discusses a dark side to generative AI that isn’t talked about enough. …

password
How fraudsters undermine text passcodes

Malicious bots are taking new forms – a burst of spam and scam text messages led to 18,000+ consumer complaints at the FCC last year. One of the newest scams – artificial …

Book - Cybersecurity First Principles
Introducing the book: Cybersecurity First Principles

In this Help Net Security video interview, Rick Howard, CSO of N2K, Chief Analyst, and Senior Fellow at the Cyberwire, discusses his book – Cybersecurity First …

puzzle
Disaster recovery challenges enterprise CISOs face

An essential aspect of organizational operations is effectively responding to and returning from a disruptive event, commonly called disaster recovery. The primary objective …

Don't miss

Cybersecurity news