Video

Why the NIS2 Directive causes growing pains for businesses

Why the NIS2 Directive causes growing pains for businesses 2024-11-22 at 07:48 By Help Net Security In this Help Net Security video, Dror Liwer, co-founder of Coro, discusses how the EU’s NIS2, its latest security directive for businesses, officially became enforceable recently. This means EU companies face more demanding requirements for internal cyber resilience strategies […]

React to this headline:

Loading spinner

Why the NIS2 Directive causes growing pains for businesses Read More »

Preventing credential theft in the age of AI

Preventing credential theft in the age of AI 2024-11-21 at 06:34 By Help Net Security In this Help Net Security video, Tina Srivastava, MIT Lecturer and CEO of Badge, discusses a 20-year cryptography problem – using biometrics for authentication without storing a face/finger/voice print. This has massive implications for corporate and personal security/privacy because there

React to this headline:

Loading spinner

Preventing credential theft in the age of AI Read More »

Safeguarding the DNS through registries

Safeguarding the DNS through registries 2024-11-20 at 07:16 By Help Net Security The integrity of our online ecosystem heavily relies on domain registries, which serve as the foundation for secure and trusted digital experiences. However, threats like Domain Name System (DNS) abuse– manifesting as phishing, malware, and botnets – jeopardize this security. Such abuses harm

React to this headline:

Loading spinner

Safeguarding the DNS through registries Read More »

Evaluating GRC tools

Evaluating GRC tools 2024-11-18 at 07:05 By Help Net Security According to Gartner, the broad range of pricing for government, risk, and compliance (GRC) tools requires enterprise risk management (ERM) leaders to be well-versed in distinct pricing tiers of GRC solutions. In this Help Net Security video, Joel Backaler, Director/Analyst, Risk Technology & Analytics at

React to this headline:

Loading spinner

Evaluating GRC tools Read More »

Using AI to drive cybersecurity risk scoring systems

Using AI to drive cybersecurity risk scoring systems 2024-11-15 at 07:18 By Help Net Security In this Help Net Security video, Venkat Gopalakrishnan, Principal Data Science Manager at Microsoft, discusses the development of AI-driven risk scoring models tailored for cybersecurity threats, and how AI is revolutionizing risk assessment and management in cybersecurity. The post Using

React to this headline:

Loading spinner

Using AI to drive cybersecurity risk scoring systems Read More »

What 2025 holds for user identity protection

What 2025 holds for user identity protection 2024-11-14 at 06:45 By Help Net Security In this Help Net Security video, David Cottingham, President of rf IDEAS, discusses what he sees as the most prominent areas for improvement and continued change in the space: As we move into 2025, it’s evident that businesses recognize MFA as

React to this headline:

Loading spinner

What 2025 holds for user identity protection Read More »

Cyber professionals face an IP loss reckoning in 2025

Cyber professionals face an IP loss reckoning in 2025 2024-11-13 at 07:06 By Help Net Security AI can expose your work secrets. The same goes for AI-generated content, which has revolutionized workplace productivity but comes with hidden risks. As more employees use AI models to streamline tasks—whether drafting reports, building code, or designing products, they

React to this headline:

Loading spinner

Cyber professionals face an IP loss reckoning in 2025 Read More »

Ambitious cybersecurity regulations leave companies in compliance chaos

Ambitious cybersecurity regulations leave companies in compliance chaos 2024-11-12 at 06:03 By Help Net Security While the goal of cybersecurity regulations is to bring order among organizations and ensure they take security and risks seriously, the growing number of regulations has also introduced a considerable set of challenges that organizations and their leaders must address.

React to this headline:

Loading spinner

Ambitious cybersecurity regulations leave companies in compliance chaos Read More »

Setting a security standard: From vulnerability to exposure management

Setting a security standard: From vulnerability to exposure management 2024-11-11 at 06:36 By Help Net Security Vulnerability management has been the standard approach to fending off cyber threats for years. Still, it falls short by focusing on a limited number of vulnerabilities, often resolving only 1% to 20% of issues. In 2024, with the average

React to this headline:

Loading spinner

Setting a security standard: From vulnerability to exposure management Read More »

Key cybersecurity predictions for 2025

Key cybersecurity predictions for 2025 2024-11-06 at 06:33 By Help Net Security In this Help Net Security video, Chris Gibson, CEO at FIRST, discusses the evolving threat landscape and provides a unique take on where data breaches and cyber attacks will be in 2025. The post Key cybersecurity predictions for 2025 appeared first on Help

React to this headline:

Loading spinner

Key cybersecurity predictions for 2025 Read More »

Cybersecurity in crisis: Are we ready for what’s coming?

Cybersecurity in crisis: Are we ready for what’s coming? 2024-11-04 at 06:35 By Help Net Security In this Help Net Security video, James Edgar, CISO at Corpay, reveals insights into cybersecurity health, concerns, challenges, and other considerations for building a solid defense program. Key insights revealed in Corpay’s 2024 State of Business Cybersecurity Report: 67%

React to this headline:

Loading spinner

Cybersecurity in crisis: Are we ready for what’s coming? Read More »

Threat actors are stepping up their tactics to bypass email protections

Threat actors are stepping up their tactics to bypass email protections 2024-11-01 at 06:33 By Help Net Security Although most organizations use emails with built-in security features that filter out suspicious messages, criminals always find a way to bypass these systems. With the development of AI technology, phishing is becoming increasingly difficult to recognize, allowing

React to this headline:

Loading spinner

Threat actors are stepping up their tactics to bypass email protections Read More »

Why cyber tools fail SOC teams

Why cyber tools fail SOC teams 2024-10-31 at 06:34 By Help Net Security A recent Vectra AI report highlights a growing distrust of threat detection tools. 47% of respondents note they do not trust their tools to work the way they need them to. Moreover, 60% of SOC practitioners say security vendors flood them with

React to this headline:

Loading spinner

Why cyber tools fail SOC teams Read More »

The state of password security in 2024

The state of password security in 2024 2024-10-29 at 06:33 By Help Net Security In this Help Net Security video, John Bennett, CEO at Dashlane, discusses their recent Global Password Health Score Report, detailing the global state of password health and hygiene. Poor security habits like password reuse remain widespread. With passwordless technologies like passkeys

React to this headline:

Loading spinner

The state of password security in 2024 Read More »

Adversarial groups adapt to exploit systems in new ways

Adversarial groups adapt to exploit systems in new ways 2024-10-28 at 06:36 By Help Net Security In this Help Net Security video, Jake King, Head of Threat & Security Intelligence at Elastic, discusses the key findings from the 2024 Elastic Global Threat Report. Adversaries are utilizing off-the-shelf tools Offensive security tools (OSTs), including Cobalt Strike

React to this headline:

Loading spinner

Adversarial groups adapt to exploit systems in new ways Read More »

How to fend off a quantum computer attack

How to fend off a quantum computer attack 2024-10-25 at 07:03 By Help Net Security In this Help Net Security video, IEEE member Marc Lijour explains quantum computing and offers insight into how to fend off a quantum computer attack. The post How to fend off a quantum computer attack appeared first on Help Net

React to this headline:

Loading spinner

How to fend off a quantum computer attack Read More »

Facing the uncertainty of cyber insurance claims

Facing the uncertainty of cyber insurance claims 2024-10-24 at 06:35 By Help Net Security Cyber insurance is vital for companies mitigating cyber risks, but the industry still encounters significant challenges, including shifting policy requirements and uncertainty around coverage in the event of an incident. As cyberattacks continue to cause problems for organizations worldwide, it’s essential

React to this headline:

Loading spinner

Facing the uncertainty of cyber insurance claims Read More »

Evolving cloud threats: Insights and recommendations

Evolving cloud threats: Insights and recommendations 2024-10-23 at 07:03 By Help Net Security Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by leveraging adversary-in-the-middle (AITM) attacks to bypass multi-factor authentication (MFA). This often leads to business email compromise (BEC), which

React to this headline:

Loading spinner

Evolving cloud threats: Insights and recommendations Read More »

Evolving cybercriminal tactics targeting SMBs

Evolving cybercriminal tactics targeting SMBs 2024-10-21 at 07:01 By Help Net Security A recent Todyl report revealed a 558% increase in BEC (Business Email Compromise), AiTM (Adversary-in-the-Middle), and ATO (Account Takeover) attacks in 2024. In this Help Net Security video, David Langlands, Chief Security Officer at Todyl, discusses these evolving cyber threats. Here are the

React to this headline:

Loading spinner

Evolving cybercriminal tactics targeting SMBs Read More »

Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime’s constant rise is becoming everyone’s problem 2024-10-18 at 06:31 By Help Net Security Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced, forcing organizations to constantly adapt their defenses. The rise of deepfake technology, especially in creating realistic audio impersonations, poses new dangers.

React to this headline:

Loading spinner

Cybercrime’s constant rise is becoming everyone’s problem Read More »

Scroll to Top