threats

Modern fraud detection need not rely on PII

Modern fraud detection need not rely on PII 2024-06-14 at 07:32 By Help Net Security Trends in online fraud detection often act as the canary in the coal mine when it comes to understanding and combating the next generation of online scams, fraud and cybersecurity threats. These days, security and fraud experts worry that insufficient […]

React to this headline:

Loading spinner

Modern fraud detection need not rely on PII Read More »

AI’s role in accelerating vulnerability management

AI’s role in accelerating vulnerability management 2024-06-10 at 08:01 By Help Net Security With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In the field of vulnerability management specifically, AI is poised to have a profound impact, enhancing two key areas: Providing quicker analysis and

React to this headline:

Loading spinner

AI’s role in accelerating vulnerability management Read More »

90% of threats are social engineering

90% of threats are social engineering 2024-06-06 at 06:32 By Help Net Security In this Help Net Security video, Jakub Kroustek, Malware Research Director at Gen, discusses the Avast Q1 2024 Threat Report. The report highlights significant trends and incidents in cybersecurity. Key findings include: Surge in social engineering attacks: Nearly 90% of threats blocked

React to this headline:

Loading spinner

90% of threats are social engineering Read More »

The evolution of security metrics for NIST CSF 2.0

The evolution of security metrics for NIST CSF 2.0 2024-05-28 at 08:03 By Help Net Security CISOs have long been spreadsheet aficionados, soaking up metrics and using them as KPIs for security progress. These metrics have traditionally measured specific systems or single indicators — vulnerabilities detected, percentage of vulnerabilities patched, software and hardware asset inventory

React to this headline:

Loading spinner

The evolution of security metrics for NIST CSF 2.0 Read More »

The critical role of IT staffing in strengthening cybersecurity

The critical role of IT staffing in strengthening cybersecurity 2024-05-16 at 06:01 By Help Net Security Many organizations lack adequate IT staffing to combat cyber threats. A comprehensive approach to cybersecurity requires more than technical solutions. It involves the right staff with the unique expertise necessary to recognize and prevent potential threats. This makes IT

React to this headline:

Loading spinner

The critical role of IT staffing in strengthening cybersecurity Read More »

Tailoring responsible AI: Defining ethical guidelines for industry-specific use

Tailoring responsible AI: Defining ethical guidelines for industry-specific use 2024-05-14 at 07:01 By Mirko Zorz In this Help Net Security interview, Chris Peake, CISO & SVP at Smartsheet, explains how responsible AI should be defined by each organization to guide their AI development and usage. Peake emphasizes that implementing responsible AI requires balancing ethical considerations,

React to this headline:

Loading spinner

Tailoring responsible AI: Defining ethical guidelines for industry-specific use Read More »

The strategic advantages of targeted threat intelligence

The strategic advantages of targeted threat intelligence 2024-05-07 at 07:01 By Help Net Security In this Help Net Security video, Gabi Reish, Chief Business Development and Product Officer at Cybersixgill, discusses the role of threat intelligence in every enterprise’s security stack. Threat intelligence plays a significant role in proactively managing a company’s threat exposure. High-quality

React to this headline:

Loading spinner

The strategic advantages of targeted threat intelligence Read More »

Global attacker median dwell time continues to fall

Global attacker median dwell time continues to fall 2024-04-24 at 14:01 By Help Net Security While the use of zero-day exploits is on the rise, Mandiant’s M-Trends 2024 report reveals a significant improvement in global cybersecurity posture: the global median dwell time – the time attackers remain undetected within a target environment – has reached

React to this headline:

Loading spinner

Global attacker median dwell time continues to fall Read More »

Enterprises face significant losses from mobile fraud

Enterprises face significant losses from mobile fraud 2024-04-18 at 06:31 By Help Net Security A recent Enea survey highlights a worrying trend in enterprise security: Following ChatGPT’s launch, 76% of businesses are inadequately protected against rising AI-driven vishing and smishing threats. In this Help Net Security video, John Hughes, SVP, Head of Network Security Business

React to this headline:

Loading spinner

Enterprises face significant losses from mobile fraud Read More »

Geopolitical tensions escalate OT cyber attacks

Geopolitical tensions escalate OT cyber attacks 2024-04-15 at 07:31 By Mirko Zorz In this Help Net Security interview, Andrew Ginter, VP of Industrial Security at Waterfall Security, discusses operational technology (OT) cyber attacks and their 2024 Threat Report. He examines how global geopolitical tensions and evolving ransomware tactics are reshaping industrial cybersecurity. He sheds light

React to this headline:

Loading spinner

Geopolitical tensions escalate OT cyber attacks Read More »

The next wave of mobile threats

The next wave of mobile threats 2024-04-12 at 07:01 By Help Net Security According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security software market to grow by $2.75 billion between 2020 and 2025, expanding at a CAGR of 9.68%. In

React to this headline:

Loading spinner

The next wave of mobile threats Read More »

Healthcare’s cyber resilience under siege as attacks multiply

Healthcare’s cyber resilience under siege as attacks multiply 2024-04-04 at 07:01 By Mirko Zorz In this Help Net Security interview, Eric Demers, CEO of Madaket Health, discusses prevalent cyber threats targeting healthcare organizations. He highlights challenges in protecting patient data due to infrastructure limitations and the role of employee awareness in preventing insider threats. Demers

React to this headline:

Loading spinner

Healthcare’s cyber resilience under siege as attacks multiply Read More »

AI abuse and misinformation campaigns threaten financial institutions

AI abuse and misinformation campaigns threaten financial institutions 2024-03-29 at 07:31 By Help Net Security Though generative AI offers financial firms remarkable business and cybersecurity utility, cyberthreats relating to GenAI in financial services are a consistent concern, according to FS-ISAC. Cybercriminals exploit AI for data exfiltration The cybersecurity community’s current consensus is that adversarial usage

React to this headline:

Loading spinner

AI abuse and misinformation campaigns threaten financial institutions Read More »

95% of companies face API security problems

95% of companies face API security problems 2024-03-22 at 06:31 By Help Net Security Despite the critical role of APIs, the vast majority of commercial decision-makers are ignoring the burgeoning security risk for businesses, according to Fastly. Application Programming Interfaces (APIs) have long been recognised as a bedrock of the digital economy and recent figures

React to this headline:

Loading spinner

95% of companies face API security problems Read More »

Fake data breaches: Countering the damage

Fake data breaches: Countering the damage 2024-03-21 at 08:01 By Help Net Security Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately, even fake data breaches can have real repercussions. Earlier this year, a hacker on a criminal forum claimed to have stolen data

React to this headline:

Loading spinner

Fake data breaches: Countering the damage Read More »

Malware stands out as the fastest-growing threat of 2024

Malware stands out as the fastest-growing threat of 2024 2024-03-21 at 06:01 By Help Net Security 93% of IT professionals believe security threats are increasing in volume or severity, a significant rise from 47% last year, according to Thales. The number of enterprises experiencing ransomware attacks surged by over 27% in the past year. Despite

React to this headline:

Loading spinner

Malware stands out as the fastest-growing threat of 2024 Read More »

Outsmarting cybercriminal innovation with strategies for enterprise resilience

Outsmarting cybercriminal innovation with strategies for enterprise resilience 2024-03-19 at 07:19 By Mirko Zorz In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies. Cameirão will speak at GISEC Global 2024 in Dubai, a conference and exhibition bringing

React to this headline:

Loading spinner

Outsmarting cybercriminal innovation with strategies for enterprise resilience Read More »

AI and the future of corporate security

AI and the future of corporate security 2024-03-15 at 06:30 By Help Net Security In this Help Net Security video, Tracy Reinhold, CSO at Everbridge, discusses why AI technology must be embraced while also exploring some guardrails that must be in place to protect organizations against threats using AI to penetrate facilities. The post AI

React to this headline:

Loading spinner

AI and the future of corporate security Read More »

Only 13% of medical devices support endpoint protection agents

Only 13% of medical devices support endpoint protection agents 2024-03-14 at 07:00 By Help Net Security 63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) can be found on healthcare networks, while 23% of medical devices—including imaging devices, clinical IoT devices, and surgery devices—have at least one known exploited vulnerability, according to Claroty. Traditionally, medical devices have

React to this headline:

Loading spinner

Only 13% of medical devices support endpoint protection agents Read More »

How new and old security threats keep persisting

How new and old security threats keep persisting 2024-03-08 at 08:00 By Help Net Security Security leaders recognize that the pattern of buying new tech and the frantic state of find-fix vulnerability management is not working, according to Cymulate. Security leaders take proactive approach to cybersecurity Rather than waiting for the next big cyberattack and

React to this headline:

Loading spinner

How new and old security threats keep persisting Read More »

Scroll to Top