tips

The real cost of healthcare cybersecurity breaches

The real cost of healthcare cybersecurity breaches 13/11/2023 at 09:33 By Mirko Zorz With each step towards digitalization, from cloud computing to electronic records, the healthcare sector faces mounting risks that threaten not just the privacy but the very wellbeing of patients. In this Help Net Security interview, Taylor Lehmann, Director, Office of the CISO, […]

React to this headline:

Loading spinner

The real cost of healthcare cybersecurity breaches Read More »

CFTC pays whistleblowers $16M this year for mostly crypto tips

CFTC pays whistleblowers $16M this year for mostly crypto tips 01/11/2023 at 03:02 By Cointelegraph By Brayden Lindrea Two of the CFTC’s crypto tipsters scored $15 million alone which brought successful enforcement cases for the regulator. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

CFTC pays whistleblowers $16M this year for mostly crypto tips Read More »

Quishing: Tricks to look out for

Quishing: Tricks to look out for 26/10/2023 at 11:01 By Zeljka Zorz QR code phishing – aka “quishing” – is on the rise, according to HP, Darktrace, Malwarebytes, AusCERT, and many others. What are QR codes? QR codes are two-dimensional matrix barcodes used for tracking products, identifying items, simplifying actions such as connecting to a

React to this headline:

Loading spinner

Quishing: Tricks to look out for Read More »

10 essential cybersecurity cheat sheets available for free

10 essential cybersecurity cheat sheets available for free 18/10/2023 at 07:02 By Help Net Security Cheat sheets are concise, to-the-point references tailored for instant insights. This article provides a curated list of 10 essential cybersecurity cheat sheets, all free to download. Whether you’re seeking a quick refresher or a beginner trying to make sense of

React to this headline:

Loading spinner

10 essential cybersecurity cheat sheets available for free Read More »

How to go from collecting risk data to actually reducing risk?

How to go from collecting risk data to actually reducing risk? 17/10/2023 at 08:17 By Help Net Security Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: they need to move beyond finding risks to effectively mitigating risk. Making that transition starts with a shift from using “risks

React to this headline:

Loading spinner

How to go from collecting risk data to actually reducing risk? Read More »

15 free Microsoft 365 security training modules worth your time

15 free Microsoft 365 security training modules worth your time 11/10/2023 at 07:32 By Help Net Security Microsoft 365 is a cloud-based productivity suite. Beyond just tools like Word and Excel, it integrates productivity applications with cloud functionalities, device administration, and enhanced security, all within a unified experience. Managing Microsoft 365 can be difficult for

React to this headline:

Loading spinner

15 free Microsoft 365 security training modules worth your time Read More »

9 essential ransomware guides and checklists available for free

9 essential ransomware guides and checklists available for free 02/10/2023 at 08:03 By Help Net Security According to Fortinet, ransomware activity has intensified, registering an increase of 13 times compared to the beginning of 2023 in terms of all malware detections. The rise of Ransomware-as-a-Service has primarily driven this surge in ransomware variations. According to

React to this headline:

Loading spinner

9 essential ransomware guides and checklists available for free Read More »

Why more security doesn’t mean more effective compliance

Why more security doesn’t mean more effective compliance 22/09/2023 at 08:31 By Help Net Security Financial institutions have always been a valuable target for cyberattacks. That’s partly why banking and financial institutions are heavily regulated and have more compliance requirements than those in most other industries. A slew of new rules have been put in

React to this headline:

Loading spinner

Why more security doesn’t mean more effective compliance Read More »

18 free Microsoft Azure cybersecurity resources you should check out

18 free Microsoft Azure cybersecurity resources you should check out 20/09/2023 at 07:33 By Help Net Security Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the way for the future. Whether you’re looking to build, run, or

React to this headline:

Loading spinner

18 free Microsoft Azure cybersecurity resources you should check out Read More »

The hidden dangers of low-value data

The hidden dangers of low-value data 18/09/2023 at 08:05 By Help Net Security In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to live, watch, and wait for the perfect moment to steal

React to this headline:

Loading spinner

The hidden dangers of low-value data Read More »

Access control in cloud-native applications in multi-location environments (NIST SP 800-207)

Access control in cloud-native applications in multi-location environments (NIST SP 800-207) 14/09/2023 at 11:47 By Help Net Security NIST released Special Publication (SP) 800-207A – “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments.” Enterprise application environments consist of geographically distributed and loosely coupled microservices that span multiple cloud and

React to this headline:

Loading spinner

Access control in cloud-native applications in multi-location environments (NIST SP 800-207) Read More »

The critical role of authorization in safeguarding financial institutions

The critical role of authorization in safeguarding financial institutions 14/09/2023 at 07:01 By Help Net Security According to a recent Cost of Data Breach report, the financial industry has the second highest average cost for a data breach, making the value well worth financial institutions investing more into authorization. In this Help Net Security video,

React to this headline:

Loading spinner

The critical role of authorization in safeguarding financial institutions Read More »

How should SMBs navigate the phishing minefield?

How should SMBs navigate the phishing minefield? 13/09/2023 at 07:47 By Zeljka Zorz In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on how to minimize the threat phishing presents to their organization’s operations and long-term success. What makes phishing attacks particularly challenging for small

React to this headline:

Loading spinner

How should SMBs navigate the phishing minefield? Read More »

17 free AWS cybersecurity courses you can take right now

17 free AWS cybersecurity courses you can take right now 12/09/2023 at 08:02 By Help Net Security Amazon Web Services (AWS) is the most extensive and widely-used cloud platform in the world, providing more than 200 services through global data centers. It serves millions of clients, ranging from startups to major corporations and government organizations.

React to this headline:

Loading spinner

17 free AWS cybersecurity courses you can take right now Read More »

Empowering consumer privacy with network security

Empowering consumer privacy with network security 11/09/2023 at 07:38 By Help Net Security Every online interaction hinges on the bedrock of network security. With cyber threats and data breaches making headlines daily, businesses must understand how network security safeguards consumer privacy. In this Help Net Security video, Shawn Edwards, CSO at Zayo Group, discusses how

React to this headline:

Loading spinner

Empowering consumer privacy with network security Read More »

Cyber talent gap solutions you need to know

Cyber talent gap solutions you need to know 06/09/2023 at 07:03 By Help Net Security 90% of consumers across the US and UK are concerned about cybersecurity’s future if students aren’t exposed to the field at an earlier age, according to ThreatX. 88% are worried that today’s talent shortage will negatively impact protection of their

React to this headline:

Loading spinner

Cyber talent gap solutions you need to know Read More »

Why end-to-end encryption matters

Why end-to-end encryption matters 05/09/2023 at 07:16 By Help Net Security In this Help Net Security video, Kayne McGladrey, IEEE Senior Member and Field CISO at Hyperproof, discusses end-to-end encryption (E2EE). E2EE ensures that only two parties – a sender and a receiver – can access data, and helps to protect consumers and businesses from

React to this headline:

Loading spinner

Why end-to-end encryption matters Read More »

6 free resources for getting started in cybersecurity

6 free resources for getting started in cybersecurity 05/09/2023 at 06:32 By Help Net Security Cybersecurity is not just a career field on the rise – it’s a calling that’s increasingly vital to the infrastructure of our world. But stepping into the universe of threat vectors and intrusion detection systems might sound like a journey

React to this headline:

Loading spinner

6 free resources for getting started in cybersecurity Read More »

ChatGPT on the chopping block as organizations reevaluate AI usage

ChatGPT on the chopping block as organizations reevaluate AI usage 31/08/2023 at 06:31 By Help Net Security ChatGPT has attracted hundreds of millions of users and was initially praised for its transformative potential. However, concerns for safety controls and unpredictability have landed it on IT leaders’ list of apps to ban in the workplace. In

React to this headline:

Loading spinner

ChatGPT on the chopping block as organizations reevaluate AI usage Read More »

What makes a good ASM solution stand out

What makes a good ASM solution stand out 29/08/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that organizations should redefine their attack surface concept and discusses proactive measures they can take to strengthen their

React to this headline:

Loading spinner

What makes a good ASM solution stand out Read More »

Scroll to Top