Please turn on your JavaScript for this page to function normally.
ransomware
What businesses can do to anticipate and mitigate ransomware threats

In this Help Net Security video, Kevin Holvoet, Cyber Threat Intelligence Instructor, SANS Institute, discusses ransomware and Ransomware as a Service (Raas) attacks, and …

identity theft resource center
A closer look at identity crimes committed against individuals

In this Help Net Security video, James E. Lee, Chief Operating Officer of the Identity Theft Resource Center, discusses the 2021 Trends in Identity Report, which looks at the …

Businesses expect the government to increase its financial assistance for all ransomware incidents

Businesses are increasingly concerned about how they will meet ransomware demands. Only 19 percent of those surveyed have ransomware coverage limits above $600,000, while over …

DDoS
DDoS tales from the SOC

In this Help Net Security video, Bryant Rump, Principal Security Architect at Neustar Security Services, talks about the challenges of mitigating immense DDoS attacks. He …

fraud detection
What type of fraud enables attackers to make a living?

A consumer’s online account where they login and input their passwords is a very lucrative target for cybercriminals. In this Help Net Security video, David Senecal, VP …

attacks
How merchants can defend themselves against Magecart attacks

In this Help Net Security video, Angel Grant, VP of Security, F5, explains what Magecart attacks are and how they have evolved over the years. Grant illustrates how …

encryption
OpenFHE: Open-Source Fully Homomorphic Encryption

Fully Homomorphic Encryption (FHE) is a cryptographic primitive that enables performing computations over encrypted data without having access to the secret key. In this Help …

industrial
Why smart factories need to prioritize cybersecurity

Recent Capgemini research revealed that the vast majority of organizations do not have device visibility at their smart factory locations. The use of legacy machinery, …

IoT
How attackers are exploiting corporate IoT

In this Help Net Security video, Brian Contos, CSO at Phosphorus Cybersecurity, discusses how most companies consider IoT threats to be limited in scope. In actuality, a …

Android 13
Google releases Android 13 with improved privacy and security features

Google released Android 13, and it is already rolling out to eligible Pixel smartphones. In this Help Net Security video, you’ll learn more about the latest privacy and …

Active Directory
Why organizations should control Active Directory permissions

In this Help Net Security video, Matthew Vinton, Strategic Systems Consultant at Quest Software, illustrates the importance of regularly analyzing, controlling and adapting …

connected house
Matter protocol: Secure, reliable interoperability for smart home devices

The biggest names in smart home (Apple, Amazon, Google, Samsung and more) have come together to agree on a common set of standards that will allow for greater …

Don't miss

Cybersecurity news