Consumers want convenience without sacrificing security
Consumers worldwide want frictionless online experiences without sacrificing the security of personal information, according to a recent survey from Ping Identity. With 63% …
Why are K-12 educational institutions reluctant to report cyber incidents?
A recent report from the US Government Accountability Office (GAO) has shown that K-12 educational institutions are reluctant to report cyber incidents as they fear they would …
Identifying key areas for fraud risk during the recession
As economic pressure increases, so does fraud risk. While the world slides into a recession, the resulting increased debt, supply chain delays, and inflation create increased …
CISOs in investment firms help fast-track cybersecurity startups
In this Help Net Security video, Frank Kim, CISO-in-Residence at YL Ventures, discusses the growing role of CISOs in investment firms and how their role as advisors helps …
How an effective fraud prevention strategy can force fraudsters to invest more in their attacks
Since the early stages of the pandemic, account takeover fraud (ATO) has significantly transformed, quickly becoming one of the fastest-growing cybersecurity threats with 22% …
How the dynamics of phishing attacks are changing
In this Help Net Security video, Alex Paquette, COO at Ironscales, discusses the impact in terms of the time and energy required to defend against the never-ending and …
Introducing the book: The Security Analyst’s Guide to Suricata
In this Help Net Security video interview, Eric Leblond, CTO at Stamus Networks, talks about The Security Analyst’s Guide to Suricata, a book he co-wrote with Peter Manev. Key …
How cloud PCs act as an insurance plan for ransomware recovery
Although companies are spending billions on preventative security measures, attacks are a common occurrence. Business continuity requires enterprises to go beyond prevention …
The impact of inadequate SaaS management
In this Help Net Security video, Uri Haramati, CEO at Torii, talks about how it’s impossible for IT to take full ownership or responsibility for managing cloud apps today. …
What cyber insurance really covers
With cybersecurity threat vectors evolving every day and with attackers employing a more innovative and unpredictable approach through combining various types of attack, it’s …
Legacy IT system modernization largely driven by security concerns
For the first time ever, digitalization is the driving force across the enterprise, according to Advanced’s Mainframe Modernization Business Barometer Report. Organizations …
Three security design principles for public REST APIs
In this Help Net Security video, Dr. Pedram Hayati, Founder of SecDim, offers a technical write-up based on a secure programming challenge. The task was inspired by a major …