Ransomware predictions for 2023
In this Help Net Security video, Dave Trader, Field CISO at Presidio, talks about the evolution of ransomware attacks and outlines what we can expect in 2023. The lack of …
What happens once scammers receive funds from their victims
In this Help Net Security video, Ronnie Tokazowski, Principal Threat Advisor at Cofense, offers insight into the world’s most lucrative cybercrime – business email …
Lack of key domain security measures leaves organizations at risk
In this Help Net Security video, Ihab Shraim, CTO at CSC, talks about how 75% of the Forbes Global 2000 are exposing themselves to significant enterprise risks as third …
5 tips for building a culture of cybersecurity accountability
In this Help Net Security video, Corey Nachreiner, CSO at WatchGuard, talks about how effective cybersecurity often boils down to doing the basics: patching, updating, and …
How companies can avoid costly data breaches
IBM found that it takes on average 277 days to discover a security breach and costs businesses an average of $4.35 million per breach. Moreover, the time-to-discovery can …
Cybersecurity predictions for 2023: Diversity is key
In this Help Net Security video, John Xereas, Executive Director, Technology Solutions at Raytheon Intelligence & Space, offers his cybersecurity predictions for 2023. …
Security measures to protect Kubernetes workloads
As companies undergo the shift to Kubernetes, security must be considered throughout the entire data lifecycle for IT teams who are constantly facing potential data breaches, …
Insights into insider threats: Detecting and monitoring abnormal user activity
A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever …
How IoT is changing the threat landscape for businesses
Where IoT-enabled devices connect to wider networks, their potential functionalities are immense, with countless applications across various industries, including production …
Deal with sophisticated bot attacks: Learn, adapt, improve
A computer program known as a “bot” acts as an agent for a user or another program or mimics human action. Bots are typically used to automate particular tasks so …
The evolution of DevSecOps
73% of IT decision-makers admit more could be done to improve their DevSecOps practices, with many organizations behind in their goals, according to a survey conducted by …
Consumers want convenience without sacrificing security
Consumers worldwide want frictionless online experiences without sacrificing the security of personal information, according to a recent survey from Ping Identity. With 63% …