Please turn on your JavaScript for this page to function normally.
Resecurity
Resecurity’s AI-powered solutions now available on Microsoft Azure

Resecurity’s AI-powered solutions provide proactive alerts and visibility of digital risks targeting the enterprise ecosystem. By joining the Microsoft Azure marketplace, …

How a cyber asset management strategy can help enterprises detect threats

Whether it’s through stolen credentials, phishing attacks, or simply user errors, people continue to pose the greatest risk to cybersecurity. While behavioral attacks are …

lock
Applying Shift Left principles to third party risk management

In this Help Net Security video, Etai Hochman, CTO at Mirato, talks about applying Shift Left, a concept that originated with developers to find and prevent defects early in …

person
Malicious activities insiders perform in enterprise applications

The past few years have clearly demonstrated that the longer it takes to detect malicious activities, the more costly the breach. In this Help Net Security video, Doron …

magnifying glass
The challenges and advantages of building behavior-based threat detection

In this video for Help Net Security, Scott Sutherland, Senior Director, Adversary Simulation and Infrastructure Testing, NetSPI, discusses how, in order to stay ahead of …

Cyber Week 2022 video
Cyber Week 2022 video walkthrough

Cyber Week is a large annual international cybersecurity event, hosted each year at Tel Aviv University in Israel. In this Help Net Security video, we take you inside Cyber …

eavesdropping
How businesses are prioritizing data privacy

In 2021, the demand for data privacy jobs soared with no indication of slowing down and stemming from the proliferation of new government regulations and cloud migration. In …

question
How parents can talk about online safety and personal info protection with their kids

Gen Zers might seem like digital pros but, they often aren’t armed with enough resources to keep themselves safe online. The FBI reported that, in 2020 alone, there were …

What are the solutions to cybersecurity hiring challenges?

(ISC)² published findings from its 2022 Cybersecurity Hiring Managers research that shed light on best practices for recruiting, hiring and onboarding entry- and junior-level …

wireless
Exploring the insecurity of readily available Wi-Fi networks

In this video for Help Net Security, Andy Thompson, Global Research Evangelist at CyberArk, talks about Wi-Fi security. He walks you through various protocols we see in the …

AWS keys
Python packages with malicious code expose secret AWS credentials

Sonatype researchers have discovered Python packages that contain malicious code that peek into and expose secret AWS credentials, network interface information, and …

phishing
How phishing attacks are becoming more sophisticated

The latest APWG’s Phishing Activity Trends Report reveals that in the first quarter of 2022 there were 1,025,968 total phishing attacks—the worst quarter for phishing observed …

Don't miss

Cybersecurity news