Please turn on your JavaScript for this page to function normally.
mobile devices
Businesses lack visibility into run-time threats against mobile apps and APIs

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …

chess
How can organizations stay ahead of cybersecurity challenges?

The onslaught of ransomware attacks has catapulted cybersecurity to the forefront of global business operations. However, just 36% of mid-sized organizations still don’t have …

cloud
Enterprises face a multitude of barriers to securing diverse cloud environments

60% of IT and security leaders are not confident in their organization’s ability to ensure secure cloud access, even as adoption continues to grow across a diverse range of …

fake
How to spot deep-faked candidates during interviews

The FBI recently issued a warning that malicious attackers are using deepfakes to apply for a variety of remote work positions via virtual interviews over the internet. These …

Fraud losses
Online payment fraud losses accelerate at an alarming rate

Cumulative merchant losses to online payment fraud globally between 2023 and 2027 will exceed $343 billion, according to Juniper Research. As a comparison, this equates to …

AI
How AI and cybersecurity complement each other

As the modern world evolves, more threats arise. Knowledge of cybersecurity and artificial intelligence (AI) has become crucial to a successful business. Businesses everywhere …

SimpleRisk
SimpleRisk: Enterprise risk management simplified

In this Help Net Security video, CEO/CISO Josh Sokol, showcases SimpleRisk, a fully integrated GRC platform that can be used for all of your governance, risk management, and …

CEO
Threats emanating from digital ecosystems can be a blind spot for businesses

Cyber executives may not be sufficiently prioritizing threats from vulnerabilities within the value chain, beyond the immediate boundaries of their own organizations, …

network
Now is the time to focus on software supply chain security improvements

The shift to cloud-native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with …

CIS
Test your security configuration with a free assessment tool from CIS

CIS-CAT Lite is the free assessment tool developed by the CIS (Center for Internet Security), which helps users implement secure configurations for multiple technologies. With …

cyber insurance
Ransomware looms large over the cyber insurance industry

A Panaseer survey of global insurers across the UK and US found that 82% are expecting the rise in premiums to continue, with 74% of insurers agreeing that their inability to …

attacks
Why there is no quick fix for cyber attacks

Cybersecurity threats keep evolving, meaning that most, if not all, organizations could be dangerously exposed as the digital ecosystem develops. While some organizations …

Don't miss

Cybersecurity news