Introducing the book: The Security Analyst’s Guide to Suricata
In this Help Net Security video interview, Eric Leblond, CTO at Stamus Networks, talks about The Security Analyst’s Guide to Suricata, a book he co-wrote with Peter Manev. Key …
How cloud PCs act as an insurance plan for ransomware recovery
Although companies are spending billions on preventative security measures, attacks are a common occurrence. Business continuity requires enterprises to go beyond prevention …
The impact of inadequate SaaS management
In this Help Net Security video, Uri Haramati, CEO at Torii, talks about how it’s impossible for IT to take full ownership or responsibility for managing cloud apps today. …
What cyber insurance really covers
With cybersecurity threat vectors evolving every day and with attackers employing a more innovative and unpredictable approach through combining various types of attack, it’s …
Legacy IT system modernization largely driven by security concerns
For the first time ever, digitalization is the driving force across the enterprise, according to Advanced’s Mainframe Modernization Business Barometer Report. Organizations …
Three security design principles for public REST APIs
In this Help Net Security video, Dr. Pedram Hayati, Founder of SecDim, offers a technical write-up based on a secure programming challenge. The task was inspired by a major …
The challenges of tracking APT attacks
Advanced persistent threats (APT) are a type of attack that’s usually carried out or sponsored by a nation-state, and unlike other types of malware attacks, these pose …
Cybersecurity implications of using public cloud platforms
According to a recent Node4 report, IT managers have a generally positive view of public cloud platforms. Half of the respondents said that, despite benefits, they have had to …
Cybertech NYC 2022 video walkthrough
Help Net Security is in New York City this week for Cybertech NYC 2022 at the Javits Center. This event, which focuses on innovation and the future of cyber, brings together …
Top security priorities for 2023
In this Help Net Security video, Rodman Ramezanian, Cloud Threat Lead at Skyhigh Security, talks about what we can expect in 2023 security wise. Humans will continue to be in …
Robotic Process Automation (RPA) adoption hindered by security concerns
Robotic Process Automation (RPA) promises numerous benefits to organizations investing in it, including increased worker productivity, the automation of tedious and monotonous …
How to improve secure coding education
Did you know that not one of the top 50 undergraduate computer science programs in the U.S. requires a course in code or application security for majors? Yet the threatscape …