Video

Enterprise DSPM for Fortune 500 – 1touch.io is your go-to solution

Enterprise DSPM for Fortune 500 – 1touch.io is your go-to solution 2024-09-05 at 06:31 By Help Net Security In this Help Net Security video, Jesse Sedler, VP of Product at 1touch.io, provides a compelling overview of the company’s innovative data security posture management solutions. Founded in 2017 by industry veterans, 1touch.io leverages cutting-edge AI to […]

React to this headline:

Loading spinner

Enterprise DSPM for Fortune 500 – 1touch.io is your go-to solution Read More »

The attack with many names: SMS Toll Fraud

The attack with many names: SMS Toll Fraud 2024-09-03 at 06:31 By Help Net Security Bad actors leverage premium-rate phone numbers and bots to steal billions of dollars from businesses. In this Help Net Security video, Frank Teruel, CFO at Arkose Labs, discusses how to spot and stop them. The post The attack with many

React to this headline:

Loading spinner

The attack with many names: SMS Toll Fraud Read More »

Why ransomware attackers target Active Directory

Why ransomware attackers target Active Directory 2024-08-29 at 07:02 By Help Net Security Ransomware attacks have surged 78% year-over-year, affecting various sectors and organizations and significantly impacting supply chains. In this Help, Net Security video, Craig Birch, Technology Evangelist, and Principal Security Engineer at Cayosoft, discusses the rise of ransomware attacks, why attackers often target

React to this headline:

Loading spinner

Why ransomware attackers target Active Directory Read More »

Rebrand, regroup, ransomware, repeat

Rebrand, regroup, ransomware, repeat 2024-08-26 at 06:01 By Help Net Security Changes witnessed over the last few years have led to larger ransomware groups breaking into smaller units, posing more considerable challenges for law enforcement. Ransomware actors are evading arrest more easily and adapting methods with innovative technologies. In this Help Net Security video, Shobhit

React to this headline:

Loading spinner

Rebrand, regroup, ransomware, repeat Read More »

Food security: Accelerating national protections around critical infrastructure

Food security: Accelerating national protections around critical infrastructure 2024-08-21 at 06:31 By Help Net Security In this Help Net Security video, Mike Lexa, CISO and Global VP of IT Infrastructure and Operations at CNH, discusses how the federal government is taking food security more seriously and what steps must be taken to prioritize security measures.

React to this headline:

Loading spinner

Food security: Accelerating national protections around critical infrastructure Read More »

Protecting academic assets: How higher education can enhance cybersecurity

Protecting academic assets: How higher education can enhance cybersecurity 2024-08-19 at 06:31 By Help Net Security Cyber attacks against higher education institutions increased by 70% in 2023. This is largely due to legacy endpoint security management and practices, limited IT support staff, and overwhelming amounts of data, much of which is PII (personally identifiable information).

React to this headline:

Loading spinner

Protecting academic assets: How higher education can enhance cybersecurity Read More »

How NoCode and LowCode free up resources for cybersecurity

How NoCode and LowCode free up resources for cybersecurity 2024-08-16 at 06:31 By Help Net Security In this Help Net Security video, Frederic Najman, Executive Member of the SFPN (French Union of NoCode Professionals), discusses how NoCode and LowCode technologies enable companies to free up development resources to tackle cybersecurity issues. In a context where

React to this headline:

Loading spinner

How NoCode and LowCode free up resources for cybersecurity Read More »

Current attacks, targets, and other threat landscape trends

Current attacks, targets, and other threat landscape trends 2024-08-14 at 06:31 By Help Net Security In this Help Net Security video, Kendall McKay, Strategic Lead, Cyber Threat Intelligence at Cisco Talos, discusses the trends that Cisco Talos incident response observed in incident response engagements from Q2 2024, which covers April to June. While the attacks

React to this headline:

Loading spinner

Current attacks, targets, and other threat landscape trends Read More »

Steps to improve quality engineering and system robustness

Steps to improve quality engineering and system robustness 2024-08-12 at 06:31 By Help Net Security Major tech outages have recently impacted customers and operations at McDonald’s, Greggs, Deliveroo, Tesco, and Barclays. In this Help Net Security video, Stephen Johnson, CEO of Roq, says it is now imperative for companies and organizations to invest significantly more

React to this headline:

Loading spinner

Steps to improve quality engineering and system robustness Read More »

Securing against GenAI weaponization

Securing against GenAI weaponization 2024-08-08 at 06:31 By Help Net Security In this Help Net Security video, Aaron Fulkerson, CEO of Opaque, discusses how the weaponization of generative AI (GenAI) has made existing data privacy practices (like masking, anonymization, tokenization, etc.) obsolete. Fulkerson provides recommendations for companies to realize they must proactively plan to mitigate

React to this headline:

Loading spinner

Securing against GenAI weaponization Read More »

How life sciences companies use AI to fill the cybersecurity skills gap

How life sciences companies use AI to fill the cybersecurity skills gap 2024-08-05 at 06:31 By Help Net Security In this Help Net Security video, Beth Miller, Field CISO at Code42, highlights a significant trend: 73% of life sciences companies turn to AI to address the cybersecurity skills gap, surpassing adoption rates in other industries.

React to this headline:

Loading spinner

How life sciences companies use AI to fill the cybersecurity skills gap Read More »

Practical strategies to mitigate risk and secure SAP environments

Practical strategies to mitigate risk and secure SAP environments 2024-08-01 at 06:31 By Help Net Security Large companies use ERP applications to manage business processes, including payroll and financial planning. This is precisely why bad actors are taking a renewed interest in these legacy systems – and succeeding. In this Help Net Security video, JP

React to this headline:

Loading spinner

Practical strategies to mitigate risk and secure SAP environments Read More »

The gap between business confidence and cyber resiliency

The gap between business confidence and cyber resiliency 2024-07-29 at 06:06 By Help Net Security In this Help Net Security video, Jim Liddle, Nasuni’s Chief Innovation Officer, discusses the findings of its new 2024 industry research report, The Era of Hybrid Cloud Storage. Key takeaways: Cloud strategies are at the forefront of enterprise success. Enterprises

React to this headline:

Loading spinner

The gap between business confidence and cyber resiliency Read More »

Researchers expose GitHub Actions workflows as risky and exploitable

Researchers expose GitHub Actions workflows as risky and exploitable 2024-07-25 at 06:31 By Help Net Security GitHub is an immensely popular platform, with over 100 million developers and over 90% of Fortune 100 companies utilizing it. Despite its widespread use, many GitHub Actions workflows remain insecure, often due to excessive privileges or high-risk dependencies. In

React to this headline:

Loading spinner

Researchers expose GitHub Actions workflows as risky and exploitable Read More »

Despite economic uncertainty, organizations are prioritizing SaaS security investments

Despite economic uncertainty, organizations are prioritizing SaaS security investments 2024-07-23 at 06:31 By Mirko Zorz In this Help Net Security video, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the key findings of their recent annual SaaS Security Survey Report, conducted in partnership with the Cloud Security Alliance (CSA). Seventy percent of organizations have

React to this headline:

Loading spinner

Despite economic uncertainty, organizations are prioritizing SaaS security investments Read More »

Cyber insurance 2.0: The systemic changes required for future security

Cyber insurance 2.0: The systemic changes required for future security 2024-07-22 at 06:31 By Help Net Security Digitalization has evolved into a systemic risk for organizations – and, therefore, cyber insurers. With the global cost of cybercrime skyrocketing, something has to change. In this Help Net Security video, Vishaal Hariprasad, CEO at Resilience, discusses how

React to this headline:

Loading spinner

Cyber insurance 2.0: The systemic changes required for future security Read More »

Signatures should become cloud security history

Signatures should become cloud security history 2024-07-18 at 06:01 By Help Net Security It’s becoming evident that the legacy practice of signature-based threat detection needs to be improved for cloud security challenges. In this Help Net Security video, Jimmy Mesta, CTO at RAD Security, discusses a new proposed standard for creating behavioral fingerprints of open-source

React to this headline:

Loading spinner

Signatures should become cloud security history Read More »

Encrypted traffic: A double-edged sword for network defenders

Encrypted traffic: A double-edged sword for network defenders 2024-07-15 at 06:31 By Help Net Security Organizations are ramping up their use of encrypted traffic to lock down data. Could they be making it easier to hide threats in the process? On one hand, encryption means enhanced privacy, but it can also make the job of

React to this headline:

Loading spinner

Encrypted traffic: A double-edged sword for network defenders Read More »

Travel scams exposed: How to recognize and avoid them

Travel scams exposed: How to recognize and avoid them 2024-07-11 at 06:31 By Help Net Security In this Help Net Security video, Aaron Walton, Threat Intel Analyst at Expel, discusses travel scams. For the past 18 months, the Expel SOC team has observed a campaign targeting administrative credentials for Booking.com. The attackers create phishing emails

React to this headline:

Loading spinner

Travel scams exposed: How to recognize and avoid them Read More »

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices 2024-07-09 at 06:31 By Help Net Security Shadow engineering is present in many organizations, and it can lead to security, compliance, and risk challenges. In this Help Net Security video, Darren Meyer, Staff Research Engineer at Endor Labs, discusses why it causes issues and how

React to this headline:

Loading spinner

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices Read More »

Scroll to Top