Please turn on your JavaScript for this page to function normally.
industrial
Why smart factories need to prioritize cybersecurity

Recent Capgemini research revealed that the vast majority of organizations do not have device visibility at their smart factory locations. The use of legacy machinery, …

IoT
How attackers are exploiting corporate IoT

In this Help Net Security video, Brian Contos, CSO at Phosphorus Cybersecurity, discusses how most companies consider IoT threats to be limited in scope. In actuality, a …

Android 13
Google releases Android 13 with improved privacy and security features

Google released Android 13, and it is already rolling out to eligible Pixel smartphones. In this Help Net Security video, you’ll learn more about the latest privacy and …

Active Directory
Why organizations should control Active Directory permissions

In this Help Net Security video, Matthew Vinton, Strategic Systems Consultant at Quest Software, illustrates the importance of regularly analyzing, controlling and adapting …

connected house
Matter protocol: Secure, reliable interoperability for smart home devices

The biggest names in smart home (Apple, Amazon, Google, Samsung and more) have come together to agree on a common set of standards that will allow for greater …

Java
How to manage the intersection of Java, security and DevOps at a low complexity cost

In this Help Net Security video, Erik Costlow, Senior Director of Product Management at Azul, talks about Java centric vulnerabilities and the headache they have become for …

security awareness
25% of employees don’t care enough about cybersecurity to report a security incident

According to a new Tessian report, 30% employees do not think they personally play a role in maintaining their company’s cybersecurity posture. This Help Net Security video …

package
Malicious PyPI packages drop ransomware, fileless malware

In this Help Net Security video, Ax Sharma, Senior Security Researcher at Sonatype, discusses newly found PyPI packages that pack ransomware, and another package that appears …

tools
How bad actors are utilizing the InterPlanetary File Systems (IPFS)

With the continued rise in adoption of cloud services, bad actors are utilizing the InterPlanetary File System (IPFS) as a new playing ground for phishing attacks. In fact, …

Black Hat USA 2022
Black Hat USA 2022 video walkthrough

In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal …

account
Stolen credentials are the most common attack vector companies face

60% of IT security decision makers believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20%), …

zero trust
Implementing zero trust for a secure hybrid working enterprise

In this Help Net Security video, Kevin Peterson, Cybersecurity Strategist at Xalient, provides an overview of the early days of zero trust, illustrates where we are today, and …

Don't miss

Cybersecurity news