Don’t miss

Wi-Fi 7’s mission-critical role in enterprise, industrial networking

Wi-Fi 7’s mission-critical role in enterprise, industrial networking 2024-01-02 at 06:31 By Mirko Zorz As we transition from Wi-Fi 6 to the more advanced Wi-Fi 7, we uncover the significant enhancements in speed, efficiency, and spectrum usage that set it apart from its predecessors. In this Help Net Security interview, Tiago Rodrigues, CEO at Wireless […]

React to this headline:

Loading spinner

Wi-Fi 7’s mission-critical role in enterprise, industrial networking Read More »

Why you need to extend enterprise IT security to the mainframe

Why you need to extend enterprise IT security to the mainframe 2023-12-29 at 07:32 By Help Net Security Organizations with mainframes face a unique challenge: extending consistency across the entire enterprise, including mainframe environments. The ongoing issue lies in the incompatibility of tools designed for both mainframes and enterprise settings, resulting in disparate solutions, training

React to this headline:

Loading spinner

Why you need to extend enterprise IT security to the mainframe Read More »

API security in 2024: Predictions and trends

API security in 2024: Predictions and trends 2023-12-29 at 07:02 By Help Net Security As technology continues to advance at an unprecedented pace, so does the complexity of API (application programming interface) security. With the proliferation of APIs in modern applications and services, organizations will need to develop a better understanding of their API environments

React to this headline:

Loading spinner

API security in 2024: Predictions and trends Read More »

Unveiling the true cost of healthcare cybersecurity incidents

Unveiling the true cost of healthcare cybersecurity incidents 2023-12-28 at 08:02 By Help Net Security As healthcare organizations increasingly rely on interconnected systems, electronic health records, and telemedicine, the industry becomes a prime target for malicious actors seeking to exploit vulnerabilities. The consequences of a cybersecurity breach in healthcare are not only measured in compromised

React to this headline:

Loading spinner

Unveiling the true cost of healthcare cybersecurity incidents Read More »

How to turn shadow IT into a culture of grassroots innovation

How to turn shadow IT into a culture of grassroots innovation 2023-12-28 at 07:32 By Help Net Security The proliferation of generative AI tools has been compared to the dawn of the internet, the spread of smartphones and laptops, and the mass transition to cloud computing. All these advancements make it easier for individuals to

React to this headline:

Loading spinner

How to turn shadow IT into a culture of grassroots innovation Read More »

5 pivotal cybersecurity trends for 2024

5 pivotal cybersecurity trends for 2024 2023-12-28 at 07:01 By Help Net Security In 2023, cyberattacks surged both in terms of frequency and sophistication. The proliferation of cutting-edge hacking tools and technologies – now more accessible than ever thanks to advances in generative AI – created an environment conducive for cyber threats to flourish, forcing

React to this headline:

Loading spinner

5 pivotal cybersecurity trends for 2024 Read More »

How to incorporate human-centric security

How to incorporate human-centric security 2023-12-27 at 07:32 By Help Net Security Cybersecurity is awash in threat detection and mitigation solutions: SIEM, DLP, SOAR, MDR, EDR, XDR, and more. Threat detection is essential, as it serves to locate and minimize the threat as quickly and effectively as possible. However, some companies are starting to embrace

React to this headline:

Loading spinner

How to incorporate human-centric security Read More »

5 free generative AI courses you can take right now

5 free generative AI courses you can take right now 2023-12-27 at 07:01 By Help Net Security Generative AI (GenAI) is a form of artificial intelligence technology focused on generating new content. This can include text, images, audio, and other media types. It’s a rapidly evolving field with significant implications in various industries, technology, and

React to this headline:

Loading spinner

5 free generative AI courses you can take right now Read More »

Essential DDoS statistics for understanding attack impact

Essential DDoS statistics for understanding attack impact 2023-12-27 at 06:32 By Help Net Security The impact of DDoS attacks extends far beyond mere inconvenience, as they can result in financial losses, compromised data, and erosion of customer trust. Understanding the nature and consequences of DDoS activity is essential for organizations and individuals alike as they

React to this headline:

Loading spinner

Essential DDoS statistics for understanding attack impact Read More »

New insights into the global industrial cybersecurity landscape

New insights into the global industrial cybersecurity landscape 22/12/2023 at 08:31 By Help Net Security In this Help Net Security video, William Noto, VP and Industry Principal for Claroty, discusses their recent global survey of 1,100 IT and OT security professionals who work in critical infrastructure sectors. When it comes to ransomware attacks, the impact

React to this headline:

Loading spinner

New insights into the global industrial cybersecurity landscape Read More »

11 GenAI cybersecurity surveys you should read

11 GenAI cybersecurity surveys you should read 22/12/2023 at 07:32 By Help Net Security Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. However, as the integration of these technologies continues, a vigilant approach to ethical considerations and regulatory compliance is essential to ensure that the

React to this headline:

Loading spinner

11 GenAI cybersecurity surveys you should read Read More »

Why data, AI, and regulations top the threat list for 2024

Why data, AI, and regulations top the threat list for 2024 21/12/2023 at 09:02 By Help Net Security The new year finds us confronted by a landscape characterized by political uncertainty, social fragmentation, escalating geopolitical tensions, and a turbulent macro-economic backdrop, making it crucial for security leaders to strategically prepare for the forthcoming challenges. Let’s

React to this headline:

Loading spinner

Why data, AI, and regulations top the threat list for 2024 Read More »

A closer look at the manufacturing threat landscape

A closer look at the manufacturing threat landscape 21/12/2023 at 08:49 By Help Net Security The manufacturing industry is embracing digital transformation to fuel efficiency and productivity. However, this evolution is accompanied by profound and growing cybersecurity challenges. In this Help Net Security video, Kory Daniels, CISO at Trustwave, discusses recent comprehensive research highlighting the

React to this headline:

Loading spinner

A closer look at the manufacturing threat landscape Read More »

How executives adapt to rising cybersecurity concerns in mobile networks

How executives adapt to rising cybersecurity concerns in mobile networks 21/12/2023 at 08:13 By Help Net Security In this Help Net Security video, Rowland Corr, VP & Head of Government Relations at Enea, discusses the implications of burner phones and the crisis of confidence in network operators as they struggle to protect consumers from sophisticated

React to this headline:

Loading spinner

How executives adapt to rising cybersecurity concerns in mobile networks Read More »

Are organizations moving away from passwords?

Are organizations moving away from passwords? 21/12/2023 at 07:53 By Help Net Security Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment of passkeys—sophisticated cryptographic tools designed to authenticate users with a level of sophistication and reliability that transcends traditional methods.

React to this headline:

Loading spinner

Are organizations moving away from passwords? Read More »

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers 20/12/2023 at 16:02 By Helga Labus The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 Active since 2017, the 8220 gang has been known for deploying cryptocurrency miners

React to this headline:

Loading spinner

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers Read More »

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers 20/12/2023 at 13:32 By Helga Labus Telecommunications company Comcast has confirmed a breach that exposed personal information of more than 35.8 million of Xfinity customers. Exploiting Citrix Bleed to breach Xfinity CVE-2023-4966 (aka Citrix Bleed) – an information disclosure vulnerability in Citrix NetScaler

React to this headline:

Loading spinner

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers Read More »

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime 20/12/2023 at 09:47 By Help Net Security Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their tools and boost their detection and protection capabilities, but cybercriminals are also harnessing AI for their attacks. Security

React to this headline:

Loading spinner

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime Read More »

Supply chain emerges as major vector in escalating automotive cyberattacks

Supply chain emerges as major vector in escalating automotive cyberattacks 20/12/2023 at 08:05 By Help Net Security In this Help Net Security video, Jay Yaneza, Cybersecurity Architect at VicOne, discusses how, in the first half of the year, cyberattacks on the automotive sector caused losses exceeding $11 billion. These attacks mainly targeted automotive suppliers, not

React to this headline:

Loading spinner

Supply chain emerges as major vector in escalating automotive cyberattacks Read More »

Balancing AI’s promise with privacy and intellectual property concerns

Balancing AI’s promise with privacy and intellectual property concerns 20/12/2023 at 07:31 By Help Net Security Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key strengths of AI in cybersecurity lies in its ability to predict and prevent attacks before they occur. Powered by

React to this headline:

Loading spinner

Balancing AI’s promise with privacy and intellectual property concerns Read More »

Scroll to Top