Protecting organizations by understanding end-of-life software risks
CloudSphere recently released the results of its EOL Management and Risk for IT Assets survey, which reveals the level of confidence individuals have regarding which …
Social engineering attacks anybody could fall victim to
Social engineering – also known as human hacking – is an expression that encompasses a number of methods and vectors attackers use to manipulate targets into …
Shadowserver: Get free access to timely, critical Internet security data
The Shadowserver Foundation fulfills a unique role in the cybersecurity ecosystem by supplying vital security information to Internet defenders and law enforcement at no cost. …
How supply chain threats will evolve in 2023
Software supply chain risk has grown to be a significant concern for organizations as cyber attackers look to take advantage of the accelerating digitalization that has seen …
How phishing campaigns abuse Google Ad click tracking redirects
PhishLabs by HelpSystems has identified attackers leveraging a weakness in Google’s ad service to carry out phishing campaigns on financial institutions. In this Help Net …
The most dangerous connected devices
The growing number and diversity of connected devices in every industry present new challenges for organizations to understand and manage the risks they are exposed to. In …
How to secure microservices using authorization
IT organizations looking to continue their digital transformation journey are faced with a choice – choosing between a more cost-effective, simple monolithic system or a more …
Deepfakes: What they are and how to spot them
The term “deepfake” is used for photo, video or audio content that has been manipulated to make it seem that the subject is doing or saying something they never did or said. …
AI can help you optimize your supply chain
There are three key questions concerning artificial intelligence (AI) in the supply chain: Where are we today and what are some of the tailwinds driving the implementation of …
Security stack consolidation helps CISOs lower cybersecurity spending
In this Help Net Security video, Alfredo Hickman, Head of Information Security at Obsidian Security, discusses the importance of security stack consolidation for organizations …
Cybersecurity pros opine on the future of security
Trellix released global research revealing the cost of siloed security, weak spots in protection, and lack of confidence amongst security operations teams. This Help Net …
Educational institutions must reverse their backward approach to cyber defense
As schools have become more digital, they’ve taken a somewhat backward approach to cybersecurity, historically moving slowly, and have weak cybersecurity controls and …