Why the atomized network is growing, and how to protect it
Security teams struggle to defend their dispersed networks because the technologies responsible for network security are being pushed towards obsolescence by evolutionary …
The most significant DDoS attacks in the past year
DDoS attacks are getting larger and more complex moving towards mobile networks and IoT, which are now used in cyberwarfare. In this Help Net Security video, Steve Winterfeld, …
How to gain security consciousness through cost
In this Help Net Security video, Karthik Kannan, CEO at Anvilogic, talks about predictions for the cybersecurity world in 2023 and how to gain security consciousness through cost.
Why FIDO and passwordless authentication is the future
In this Help Net Security video, Jason Kent, Director at Open Seas, explains why FIDO and passwordless authentication is the future. He dives deep into the technical reasons …
Digital forensics incident readiness
Digital forensics is used to find, examine and analyze digital evidence that can serve in criminal investigations, but also in incident response, investigations of data …
The DevSecOps approach to cloud native threat detection and response
Every SOC on the planet is grappling with the challenges of integrating detection techniques and response processes for public cloud computing. This presentation by Rich …
How can businesses decrease cyber insurance premiums while maintaining coverage?
In 2022, significant geopolitical developments have led to equally significant changes within the cyber insurance market. In this Help Net Security video, Chris Denbigh-White, …
Tracking the adversary
Raj Samani, SVP, Chief Scientist, Rapid7, discusses the tactics observed from a recent case of espionage, and what can be learned from such observations. This video was …
Ransomware: The security debt collector
High-profile ransomware news stories grabbed headlines a few years ago but faded in popularity as other attacks like cryptojacking grew more profitable. Since the first months …
Cybersecurity and quantum readiness
Avast CISO Jaya Baloo explains what quantum computing is, talks about its promises and potential pitfalls, and urges organizations to be pragmatic about preparing for its …
SMEs: Boost awareness on cybersecurity – ENISA tools and guidance
In a time of increased remote work and growing cyber threats, SMEs face major cybersecurity challenges. Low-security budget, lack of employee awareness, management support, …
Adversarial risk in the age of ransomware
Éireann Leverett, Technology and Risk Entrepreneur, makes audience think about ransomware risks from more that one perspective, and that includes the perspective of the threat …