Cybersecurity is becoming a top priority among critical infrastructure operators
Increased cyber threats and government directives have made cybersecurity a top priority among critical infrastructure organizations. This Help Net Security video highlights …
The future of attack surface management (ASM)
The legacy approach to attack surface management falls short of what modern organizations require: contextual awareness. Security teams increasingly suffer from threat …
Organizations need to change their strategy to reduce cyber risk
Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, variety, and velocity of …
Organizations are struggling with SaaS security. Why?
SaaS services are highly valuable targets as data is now being stored in the different apps and services. In this Help Net Security video, Yoav Kalati, Head of Threat …
Inadequate password and authentication requirements found in popular business web apps
Specops Software released new research finding cybersecurity weaknesses in business web apps including Shopify, Zendesk, Trello, and Stack Overflow. This Help Net Security …
Major shifts and the growing risk of identity fraud
Traditional identity fraud losses, caused by criminals illegally using victims’ information to steal money, exploded in 2021 to $24 billion — an alarming 79% increase over …
Organizations struggle to manage devices and stay ahead of vulnerabilities
Most enterprises scramble to maintain visibility and control of their endpoint devices, leading to increased security breaches and impaired ability to ward off outside …
Minimizing risk: Key cybersecurity-related M&A considerations
Global M&A hit new highs in 2021 reaching an eye-popping $5.1 trillion in total deal value, according to PwC. With economic headwinds leaving acquisition as the only …
Building trust into every aspect of an organization
In this Help Net Security video, Matthew Chiodi, Chief Trust Officer at Cerby, talks about building trust not just when it comes to applications and data, but also with …
Lack of staff and resources drives smaller teams to outsource security
Companies with small security teams continue to face a number of distinctive challenges that place these organizations at greater risk than larger enterprises, according to …
How to identify and combat online fraud
As the popularity of Buy Now, Pay Later (BNPL) grows, organizations and consumers must remain vigilant or risk becoming a victim of fraud, as account takeover attacks – where …
How organizations can implement a complete data strategy
In this Help Net Security video, Bernard Brantley, CISO at Corelight, discusses why organizations need to rethink their data strategy, challenging the assumption that they …