Please turn on your JavaScript for this page to function normally.
college
Why are K-12 educational institutions reluctant to report cyber incidents?

A recent report from the US Government Accountability Office (GAO) has shown that K-12 educational institutions are reluctant to report cyber incidents as they fear they would …

shadow
Identifying key areas for fraud risk during the recession

As economic pressure increases, so does fraud risk. While the world slides into a recession, the resulting increased debt, supply chain delays, and inflation create increased …

analyst
CISOs in investment firms help fast-track cybersecurity startups

In this Help Net Security video, Frank Kim, CISO-in-Residence at YL Ventures, discusses the growing role of CISOs in investment firms and how their role as advisors helps …

thief
How an effective fraud prevention strategy can force fraudsters to invest more in their attacks

Since the early stages of the pandemic, account takeover fraud (ATO) has significantly transformed, quickly becoming one of the fastest-growing cybersecurity threats with 22% …

phishing
How the dynamics of phishing attacks are changing

In this Help Net Security video, Alex Paquette, COO at Ironscales, discusses the impact in terms of the time and energy required to defend against the never-ending and …

The Security Analyst's Guide to Suricata
Introducing the book: The Security Analyst’s Guide to Suricata

In this Help Net Security video interview, Eric Leblond, CTO at Stamus Networks, talks about The Security Analyst’s Guide to Suricata, a book he co-wrote with Peter Manev. Key …

hands
How cloud PCs act as an insurance plan for ransomware recovery

Although companies are spending billions on preventative security measures, attacks are a common occurrence. Business continuity requires enterprises to go beyond prevention …

SaaS
The impact of inadequate SaaS management

In this Help Net Security video, Uri Haramati, CEO at Torii, talks about how it’s impossible for IT to take full ownership or responsibility for managing cloud apps today. …

cyber insurance
What cyber insurance really covers

With cybersecurity threat vectors evolving every day and with attackers employing a more innovative and unpredictable approach through combining various types of attack, it’s …

servers
Legacy IT system modernization largely driven by security concerns

For the first time ever, digitalization is the driving force across the enterprise, according to Advanced’s Mainframe Modernization Business Barometer Report. Organizations …

code
Three security design principles for public REST APIs

In this Help Net Security video, Dr. Pedram Hayati, Founder of SecDim, offers a technical write-up based on a secure programming challenge. The task was inspired by a major …

vectors
The challenges of tracking APT attacks

Advanced persistent threats (APT) are a type of attack that’s usually carried out or sponsored by a nation-state, and unlike other types of malware attacks, these pose …

Don't miss

Cybersecurity news