Please turn on your JavaScript for this page to function normally.
open source
The state of open-source software supply chain security in 2022

In this video for Help Net Security, Donald Fischer, CEO at Tidelift, talks about the state of open-source software supply chain security in 2022. Open source is the modern …

shark
Vulnerabilities that kept security leaders busy in Q1 2022

In this video for Help Net Security, Yotam Perkal, VP of Research at Rezilion, talks about the most critical vulnerabilities published during Q1 2022, and the relevant …

organize
What’s a vCISO and why does your company need one?

In this video for Help Net Security, Jeff Hoskins, vCISO at BARR Advisory, explains the concept of a vCISO, which stands for virtual chief information security officer, and …

Crypto-related phishing and how to avoid it

In this video for Help Net Security, Michael Aminov, Chief Architect at Perception Point, talks about a recent Binance impersonation attack and, more broadly, the ongoing …

identity
Digital ID verification: Using a mobile device to prove your identity

It’s important to understand that passwords are not passports. Using biometrics, which is a great security advancement, is not the same as identity, says Leonard …

phishing
Spreading malware through community phishing

In this video for Help Net Security, Maor Hizkiev, Senior Director Software Engineering at Datto, talks about a recently analyzed community phishing campaign revolving around …

Identity issues: Lagging cybersecurity investments are creating cybersecurity debts

A report released by CyberArk indicates that 79% of senior security professionals state that cybersecurity has taken a back seat in the last year in favor of accelerating …

Kali Linux
Advance your penetration testing skills by mastering Kali Linux

In this video for Help Net Security, Vijay Kumar Velu, Technical Director for Offensive Security and DFIR at BDO UK, talks about his latest book: Mastering Kali Linux for …

Consumer trust is in the doldrums: Indifference towards data exposure is widespread

Imperva has published findings from a global study on consumer perceptions of data privacy and trust in digital service providers. The results suggest that consumers feel …

cloud
Top attack techniques for breaching enterprise and cloud environments

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors to compromise critical assets in …

npm
New npm flaws let attackers better target packages for account takeover

In this video for Help Net Security, Yakir Kadkoda, Lead Security Researcher, and Assaf Morag, Lead Data Analyst at Aqua Security, talk about new npm flaws that allow …

Cybersecurity at a crossroads: Threats proliferate amidst widening talent gaps

Splunk and Enterprise Strategy Group have released a research report examining the security issues facing modern enterprises. More than 1,200 security leaders participated in …

Don't miss

Cybersecurity news