
Apple previews Lockdown Mode to protect users from targeted spyware
In this Help Net Security video, you’ll learn more about Lockdown Mode, a security capability from Apple that offers specialized additional protection to users who may …

Positive trends in the application security space
ShiftLeft recently released their 2022 AppSec Progress Report, which evaluated how the changes and advancements in static application security testing (SAST) and intelligent …

The threat of quantum computing to sensitive data
According to the US National Counterintelligence and Security Center, the U.S. is in a global quantum computing race, and China is winning. One emerging technology that could …

Resecurity’s AI-powered solutions now available on Microsoft Azure
Resecurity’s AI-powered solutions provide proactive alerts and visibility of digital risks targeting the enterprise ecosystem. By joining the Microsoft Azure marketplace, …

How a cyber asset management strategy can help enterprises detect threats
Whether it’s through stolen credentials, phishing attacks, or simply user errors, people continue to pose the greatest risk to cybersecurity. While behavioral attacks are …

Applying Shift Left principles to third party risk management
In this Help Net Security video, Etai Hochman, CTO at Mirato, talks about applying Shift Left, a concept that originated with developers to find and prevent defects early in …

Malicious activities insiders perform in enterprise applications
The past few years have clearly demonstrated that the longer it takes to detect malicious activities, the more costly the breach. In this Help Net Security video, Doron …

The challenges and advantages of building behavior-based threat detection
In this video for Help Net Security, Scott Sutherland, Senior Director, Adversary Simulation and Infrastructure Testing, NetSPI, discusses how, in order to stay ahead of …

Cyber Week 2022 video walkthrough
Cyber Week is a large annual international cybersecurity event, hosted each year at Tel Aviv University in Israel. In this Help Net Security video, we take you inside Cyber …

How businesses are prioritizing data privacy
In 2021, the demand for data privacy jobs soared with no indication of slowing down and stemming from the proliferation of new government regulations and cloud migration. In …

How parents can talk about online safety and personal info protection with their kids
Gen Zers might seem like digital pros but, they often aren’t armed with enough resources to keep themselves safe online. The FBI reported that, in 2020 alone, there were …
What are the solutions to cybersecurity hiring challenges?
(ISC)² published findings from its 2022 Cybersecurity Hiring Managers research that shed light on best practices for recruiting, hiring and onboarding entry- and junior-level …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act