cybersecurity

The rise in cyber extortion attacks and its impact on business security

The rise in cyber extortion attacks and its impact on business security 03/07/2023 at 07:08 By Help Net Security In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions. A recent report revealed that cyber extortion activity reached […]

React to this headline:

Loading spinner

The rise in cyber extortion attacks and its impact on business security Read More »

One third of security breaches go unnoticed by security professionals

One third of security breaches go unnoticed by security professionals 03/07/2023 at 06:32 By Help Net Security While surface-level confidence around hybrid cloud security is high, with 94% of global respondents stating their security tools and processes provide them with complete visibility and insights into their IT infrastructure, the reality is nearly one third of

React to this headline:

Loading spinner

One third of security breaches go unnoticed by security professionals Read More »

Short-staffed teams must find ways to do more with less

Short-staffed teams must find ways to do more with less 03/07/2023 at 06:02 By Help Net Security As more businesses experience resource and cost constraints, 86% of MSPs and MSSPs customers are outsourcing their security needs to consolidate security tools, according to OpenText. “Staffing issues that have plagued the security industry for years are getting

React to this headline:

Loading spinner

Short-staffed teams must find ways to do more with less Read More »

Unlocking internet’s secrets via monitoring, data collection, and analysis

Unlocking internet’s secrets via monitoring, data collection, and analysis 30/06/2023 at 05:05 By Mirko Zorz In this Help Net Security interview, Ryan Woodley, CEO of Netcraft, discusses the importance of monitoring, collecting, and analyzing internet data to gain a profound understanding of the internet. This insight plays a vital role in protecting and empowering customers.

React to this headline:

Loading spinner

Unlocking internet’s secrets via monitoring, data collection, and analysis Read More »

Businesses are ignoring third-party security risks

Businesses are ignoring third-party security risks 30/06/2023 at 05:05 By Help Net Security In the dynamic business landscape where third-party relationships assume a critical role, organizations confront various risks that can profoundly affect their security and compliance requirements, according to Panorays. Even amidst tough economic times, the crucial nature of these risks necessitates proactive management.

React to this headline:

Loading spinner

Businesses are ignoring third-party security risks Read More »

Employees worry less about cybersecurity best practices in the summer

Employees worry less about cybersecurity best practices in the summer 30/06/2023 at 04:17 By Help Net Security IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely, according to ThreatX. With more endpoints and applications in use, and often

React to this headline:

Loading spinner

Employees worry less about cybersecurity best practices in the summer Read More »

Popular generative AI projects pose serious security threat

Popular generative AI projects pose serious security threat 29/06/2023 at 07:48 By Help Net Security Many popular generative AI projects are an increased security threat and open-source projects that utilize insecure generative AI and LLMs also have poor security posture, resulting in an environment with substantial risk for organizations, according to Rezilion. Advancements in LLMs

React to this headline:

Loading spinner

Popular generative AI projects pose serious security threat Read More »

Preparing health systems for cyber risks and insurance coverage

Preparing health systems for cyber risks and insurance coverage 28/06/2023 at 07:32 By Mirko Zorz Our healthcare systems are at risk of infiltration by threat actors, potentially disrupting services, compromising sensitive data, and even jeopardizing patient outcomes. Among the people addressing these challenges is Dennis Fridrich, VP of Cybersecurity at TRIMEDX, who not only understands

React to this headline:

Loading spinner

Preparing health systems for cyber risks and insurance coverage Read More »

Economic volatility drives businesses to MSPs

Economic volatility drives businesses to MSPs 28/06/2023 at 06:02 By Help Net Security The current economic conditions are leading companies of all sizes to reassess their operations and business strategies to remain competitive and profitable, according to Kaseya. Business growth key driver for it budgets Budgets and resources may be shrinking, but workloads are not.

React to this headline:

Loading spinner

Economic volatility drives businesses to MSPs Read More »

Widespread BEC attacks threaten European organizations

Widespread BEC attacks threaten European organizations 27/06/2023 at 06:06 By Help Net Security European organizations experienced a greater volume and frequency of BEC attacks over the last year, as compared to organizations in the United States, according to Abnormal Security. BEC attacks volume and frequency The data is based on an analysis of email attack

React to this headline:

Loading spinner

Widespread BEC attacks threaten European organizations Read More »

Operationalizing zero trust in the cloud

Operationalizing zero trust in the cloud 23/06/2023 at 07:39 By Help Net Security Some organizations have bought into the idea that workloads in the cloud are inherently more secure than those on premises. This idea is reinforced by the concept that the cloud service provider (CSP) assumes responsibility for security. However, while a secure cloud

React to this headline:

Loading spinner

Operationalizing zero trust in the cloud Read More »

Security investments that help companies navigate the macroeconomic climate

Security investments that help companies navigate the macroeconomic climate 23/06/2023 at 07:01 By Help Net Security As data transformation progresses, cyber attacks are among the most significant growing threats to the enterprise. As seen in the recent MOVEit situation, enterprises must immediately enact cybersecurity solutions that are right for them. Every enterprise is unique, so

React to this headline:

Loading spinner

Security investments that help companies navigate the macroeconomic climate Read More »

Cloud-native security hinges on open source

Cloud-native security hinges on open source 22/06/2023 at 07:33 By Help Net Security Technologies like Kubernetes and K3S are synonymous with the success of cloud native computing and the power of open source. It is no accident they have steamrolled the competition. As enterprises look to secure cloud-native environments, open source is the critical piece

React to this headline:

Loading spinner

Cloud-native security hinges on open source Read More »

Unraveling the multifaceted threats facing telecom companies

Unraveling the multifaceted threats facing telecom companies 22/06/2023 at 07:09 By Mirko Zorz In today’s interconnected world, telecom companies serve as gateways, connecting individuals, businesses, and governments. However, this role also makes them prime targets for cyberattacks. From DDoS attacks to sophisticated spyware infiltration, telecom providers face a wide range of threats that can disrupt

React to this headline:

Loading spinner

Unraveling the multifaceted threats facing telecom companies Read More »

Increased spending doesn’t translate to improved cybersecurity posture

Increased spending doesn’t translate to improved cybersecurity posture 22/06/2023 at 06:21 By Help Net Security Security teams are stretched, with not enough people, skills or budget to cope with all their priorities, according to Panaseer. Average cybersecurity budgets increase in 2023 The survey of over 400 cybersecurity decision makers and practitioners across the US and

React to this headline:

Loading spinner

Increased spending doesn’t translate to improved cybersecurity posture Read More »

How to create SBOMs for container images

How to create SBOMs for container images 21/06/2023 at 09:06 By Help Net Security The importance of software bills of materials (SBOMs) has grown substantially in recent years as organizations recognize the need for greater transparency in the software supply chain. This focus on SBOMs is a response to increasing cybersecurity threats and legislative efforts

React to this headline:

Loading spinner

How to create SBOMs for container images Read More »

Empowering Google security and networking solutions with AI

Empowering Google security and networking solutions with AI 21/06/2023 at 06:47 By Mirko Zorz In this Help Net Security interview, Sunil Potti, VP and GM, Cloud Security Google Cloud, talks about how new security and networking solutions powered by AI help improve security so Google customers can address their most pressing security challenges and remain

React to this headline:

Loading spinner

Empowering Google security and networking solutions with AI Read More »

The significance of CIS Control mapping in the 2023 Verizon DBIR

The significance of CIS Control mapping in the 2023 Verizon DBIR 20/06/2023 at 07:48 By Help Net Security Verizon’s recently released 2023 Data Breach Investigation Report (DBIR) provides organizations with a comprehensive analysis of the evolving threat landscape and valuable insights into incident types and vulnerabilities. This year, the report includes the mapping of CIS

React to this headline:

Loading spinner

The significance of CIS Control mapping in the 2023 Verizon DBIR Read More »

10 open-source recon tools worth your time

10 open-source recon tools worth your time 20/06/2023 at 07:02 By Help Net Security Recon is the initial stage in the penetration testing process. It’s a vital phase allowing the tester to understand their target and strategize their moves. Here are ten open-source recon tools that deserve to be in your arsenal. Altdns Altdns is

React to this headline:

Loading spinner

10 open-source recon tools worth your time Read More »

Goodbyes are difficult, IT offboarding processes make them harder

Goodbyes are difficult, IT offboarding processes make them harder 19/06/2023 at 07:32 By Help Net Security When employees, contractors and service providers leave an organization, they take with them knowledge, capabilities, and professional achievements. They should leave behind any proprietary or confidential data belonging to the organization, but Osterman Research found that 69% of organizations

React to this headline:

Loading spinner

Goodbyes are difficult, IT offboarding processes make them harder Read More »

Scroll to Top