Please turn on your JavaScript for this page to function normally.
ransomware
Ransomware predictions for 2023

In this Help Net Security video, Dave Trader, Field CISO at Presidio, talks about the evolution of ransomware attacks and outlines what we can expect in 2023. The lack of …

criminal
What happens once scammers receive funds from their victims

In this Help Net Security video, Ronnie Tokazowski, Principal Threat Advisor at Cofense, offers insight into the world’s most lucrative cybercrime – business email …

vulnerability
Lack of key domain security measures leaves organizations at risk

In this Help Net Security video, Ihab Shraim, CTO at CSC, talks about how 75% of the Forbes Global 2000 are exposing themselves to significant enterprise risks as third …

security culture
5 tips for building a culture of cybersecurity accountability

In this Help Net Security video, Corey Nachreiner, CSO at WatchGuard, talks about how effective cybersecurity often boils down to doing the basics: patching, updating, and …

gap
How companies can avoid costly data breaches

IBM found that it takes on average 277 days to discover a security breach and costs businesses an average of $4.35 million per breach. Moreover, the time-to-discovery can …

predictions
Cybersecurity predictions for 2023: Diversity is key

In this Help Net Security video, John Xereas, Executive Director, Technology Solutions at Raytheon Intelligence & Space, offers his cybersecurity predictions for 2023. …

Kubernetes
Security measures to protect Kubernetes workloads

As companies undergo the shift to Kubernetes, security must be considered throughout the entire data lifecycle for IT teams who are constantly facing potential data breaches, …

hole
Insights into insider threats: Detecting and monitoring abnormal user activity

A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever …

IoT
How IoT is changing the threat landscape for businesses

Where IoT-enabled devices connect to wider networks, their potential functionalities are immense, with countless applications across various industries, including production …

bot
Deal with sophisticated bot attacks: Learn, adapt, improve

A computer program known as a “bot” acts as an agent for a user or another program or mimics human action. Bots are typically used to automate particular tasks so …

DevSecOps
The evolution of DevSecOps

73% of IT decision-makers admit more could be done to improve their DevSecOps practices, with many organizations behind in their goals, according to a survey conducted by …

consumer
Consumers want convenience without sacrificing security

Consumers worldwide want frictionless online experiences without sacrificing the security of personal information, according to a recent survey from Ping Identity. With 63% …

Don't miss

Cybersecurity news