how-to

How to get all ERC-20 tokens owned by an address

How to get all ERC-20 tokens owned by an address 2024-03-13 at 17:03 By Cointelegraph by Dilip Kumar Patairya Wallet APIs enable users to quickly locate ERC-20 tokens by wallet address. Chainbase, Alchemy and Moralis provide APIs to get token-related information. This article is an excerpt from Cointelegraph.com News View Original Source React to this […]

React to this headline:

Loading spinner

How to get all ERC-20 tokens owned by an address Read More »

10 free cybersecurity guides you might have missed

10 free cybersecurity guides you might have missed 2024-03-11 at 09:07 By Help Net Security This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific guides for various sectors and organizations. Whether you work for a small business, a large corporation, or a specific industry,

React to this headline:

Loading spinner

10 free cybersecurity guides you might have missed Read More »

How to capitalize on the Bitcoin halving

How to capitalize on the Bitcoin halving 2024-03-08 at 20:01 By Cointelegraph by Tanuj Surve Discover trading strategies to capitalize on Bitcoin halving events and optimize your investment returns in the cryptocurrency market. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

How to capitalize on the Bitcoin halving Read More »

How to create an efficient governance control program

How to create an efficient governance control program 2024-03-06 at 06:31 By Help Net Security Your success as an organization, especially in the cyber realm, depends on your security posture. To account for the ongoing evolution of digital threats, you need to implement robust governance control programs that address the current control environment and help

React to this headline:

Loading spinner

How to create an efficient governance control program Read More »

Key strategies for ISO 27001 compliance adoption

Key strategies for ISO 27001 compliance adoption 2024-02-09 at 07:32 By Mirko Zorz In this Help Net Security interview, Robin Long, founder of Kiowa Security, shares insights on how best to approach the implementation of the ISO/IEC 27001 information security standard. Long advises organizations to establish a detailed project roadmap and to book certification audits

React to this headline:

Loading spinner

Key strategies for ISO 27001 compliance adoption Read More »

10 must-read cybersecurity books for 2024

10 must-read cybersecurity books for 2024 2024-02-06 at 07:01 By Help Net Security Our list of cybersecurity books has been curated to steer your professional growth in 2024. This selection aims to provide comprehensive information security insights and knowledge, ensuring you stay ahead in your career learning journey throughout the year. Cyber for Builders: The

React to this headline:

Loading spinner

10 must-read cybersecurity books for 2024 Read More »

Kaspersky releases utility to detect iOS spyware infections

Kaspersky releases utility to detect iOS spyware infections 2024-01-17 at 13:46 By Help Net Security Kaspersky’s researchers have developed a lightweight method to detect indicators of infection from sophisticated iOS spyware such as NSO Group’s Pegasus, QuaDream’s Reign, and Intellexa’s Predator through analyzing a log file created on iOS devices. Analyzing the Shutdown.log The company’s

React to this headline:

Loading spinner

Kaspersky releases utility to detect iOS spyware infections Read More »

Securing AI systems against evasion, poisoning, and abuse

Securing AI systems against evasion, poisoning, and abuse 2024-01-09 at 06:32 By Mirko Zorz Adversaries can intentionally mislead or “poison” AI systems, causing them to malfunction, and developers have yet to find an infallible defense against this. In their latest publication, NIST researchers and their partners highlight these AI and machine learning vulnerabilities. Taxonomy of

React to this headline:

Loading spinner

Securing AI systems against evasion, poisoning, and abuse Read More »

15 free Microsoft 365 security training modules worth your time

15 free Microsoft 365 security training modules worth your time 11/10/2023 at 07:32 By Help Net Security Microsoft 365 is a cloud-based productivity suite. Beyond just tools like Word and Excel, it integrates productivity applications with cloud functionalities, device administration, and enhanced security, all within a unified experience. Managing Microsoft 365 can be difficult for

React to this headline:

Loading spinner

15 free Microsoft 365 security training modules worth your time Read More »

9 essential ransomware guides and checklists available for free

9 essential ransomware guides and checklists available for free 02/10/2023 at 08:03 By Help Net Security According to Fortinet, ransomware activity has intensified, registering an increase of 13 times compared to the beginning of 2023 in terms of all malware detections. The rise of Ransomware-as-a-Service has primarily driven this surge in ransomware variations. According to

React to this headline:

Loading spinner

9 essential ransomware guides and checklists available for free Read More »

18 free Microsoft Azure cybersecurity resources you should check out

18 free Microsoft Azure cybersecurity resources you should check out 20/09/2023 at 07:33 By Help Net Security Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the way for the future. Whether you’re looking to build, run, or

React to this headline:

Loading spinner

18 free Microsoft Azure cybersecurity resources you should check out Read More »

17 free AWS cybersecurity courses you can take right now

17 free AWS cybersecurity courses you can take right now 12/09/2023 at 08:02 By Help Net Security Amazon Web Services (AWS) is the most extensive and widely-used cloud platform in the world, providing more than 200 services through global data centers. It serves millions of clients, ranging from startups to major corporations and government organizations.

React to this headline:

Loading spinner

17 free AWS cybersecurity courses you can take right now Read More »

Empowering consumer privacy with network security

Empowering consumer privacy with network security 11/09/2023 at 07:38 By Help Net Security Every online interaction hinges on the bedrock of network security. With cyber threats and data breaches making headlines daily, businesses must understand how network security safeguards consumer privacy. In this Help Net Security video, Shawn Edwards, CSO at Zayo Group, discusses how

React to this headline:

Loading spinner

Empowering consumer privacy with network security Read More »

Cyber talent gap solutions you need to know

Cyber talent gap solutions you need to know 06/09/2023 at 07:03 By Help Net Security 90% of consumers across the US and UK are concerned about cybersecurity’s future if students aren’t exposed to the field at an earlier age, according to ThreatX. 88% are worried that today’s talent shortage will negatively impact protection of their

React to this headline:

Loading spinner

Cyber talent gap solutions you need to know Read More »

6 free resources for getting started in cybersecurity

6 free resources for getting started in cybersecurity 05/09/2023 at 06:32 By Help Net Security Cybersecurity is not just a career field on the rise – it’s a calling that’s increasingly vital to the infrastructure of our world. But stepping into the universe of threat vectors and intrusion detection systems might sound like a journey

React to this headline:

Loading spinner

6 free resources for getting started in cybersecurity Read More »

What true diversity in the cybersecurity industry looks like

What true diversity in the cybersecurity industry looks like 28/08/2023 at 07:01 By Help Net Security In this Help Net Security video, Larry Whiteside, Jr., CISO at RegScale and President of Cyversity, discusses how, now more than ever, the cybersecurity industry needs the diversity of thought to address the increasingly complex and technology-driven challenges organizations

React to this headline:

Loading spinner

What true diversity in the cybersecurity industry looks like Read More »

Understanding how attackers exploit APIs is more important than ever

Understanding how attackers exploit APIs is more important than ever 22/08/2023 at 06:32 By Help Net Security In this Help Net Security video, Andy Hornegold, Product Lead at Intruder, dives into API security and explores how several recent high-profile breaches were caused by simple failings – which didn’t require sophisticated security to prevent. The number

React to this headline:

Loading spinner

Understanding how attackers exploit APIs is more important than ever Read More »

Reinventing OT security for dynamic landscapes

Reinventing OT security for dynamic landscapes 18/08/2023 at 07:05 By Mirko Zorz From understanding the challenges of disparate OT protocols and the increasing convergence with IT to grappling with the monumental role of human error, our latest interview with Rohit Bohara, CTO at asvin, delves deep into the landscape of OT security. As cloud solutions

React to this headline:

Loading spinner

Reinventing OT security for dynamic landscapes Read More »

Deception technology and breach anticipation strategies

Deception technology and breach anticipation strategies 14/08/2023 at 08:02 By Mirko Zorz Cybersecurity is undergoing a paradigm shift. Previously, defenses were built on the assumption of keeping adversaries out; now, strategies are formed with the idea that they might already be within the network. This modern approach has given rise to advanced methods prioritizing rapid

React to this headline:

Loading spinner

Deception technology and breach anticipation strategies Read More »

How to accelerate and access DDoS protection services using GRE

How to accelerate and access DDoS protection services using GRE 11/08/2023 at 06:31 By Help Net Security As we entered 2023, the cybersecurity landscape witnessed an increase in sophisticated, high-volume attacks, according to Gcore. The maximum attack power rose from 600 to 800 Gbps. UDP flood attacks were most common and amounted to 52% of

React to this headline:

Loading spinner

How to accelerate and access DDoS protection services using GRE Read More »

Scroll to Top