Video

Major shifts in identity, ransomware, and critical infrastructure threat trends

Major shifts in identity, ransomware, and critical infrastructure threat trends 2024-03-07 at 07:20 By Help Net Security In this Help Net Security video, Michelle Alvarez, Strategic Threat Analysis Manager at IBM X-Force, discusses the 2024 X-Force Threat Intelligence Index, revealing top threats and trends the team observed last year across its global engagements and how […]

React to this headline:

Loading spinner

Major shifts in identity, ransomware, and critical infrastructure threat trends Read More »

Navigating regulation challenges for protecting sensitive healthcare data

Navigating regulation challenges for protecting sensitive healthcare data 2024-03-06 at 07:10 By Help Net Security In this Help Net Security video, Chris Bowen, CISO at ClearDATA, emphasizes the importance of digital health companies being more transparent with their users. As more and more Americans flock to direct-to-consumer digital health apps and resources, most people don’t

React to this headline:

Loading spinner

Navigating regulation challenges for protecting sensitive healthcare data Read More »

Secure your hybrid workforce: The advantages of encrypted storage

Secure your hybrid workforce: The advantages of encrypted storage 2024-03-05 at 07:02 By Help Net Security In this Help Net Security video, Ryan Amparo, Field Application Engineer at Kingston Technology, discusses the benefits of encrypted external SSDs and USBs for hybrid workforces. He talks about the differences between software and hardware encryption, why it’s important,

React to this headline:

Loading spinner

Secure your hybrid workforce: The advantages of encrypted storage Read More »

Integrating software supply chain security in DevSecOps CI/CD pipelines

Integrating software supply chain security in DevSecOps CI/CD pipelines 2024-03-04 at 07:01 By Help Net Security NIST released its final guidelines for integrating software supply chain security in DevSecOps CI/CD pipelines (SP 800-204D). In this Help Net Security video, Henrik Plate, Security Researcher at Endor Labs, talks about this report, which provides actionable measures to

React to this headline:

Loading spinner

Integrating software supply chain security in DevSecOps CI/CD pipelines Read More »

Enhancing security through proactive patch management

Enhancing security through proactive patch management 2024-03-04 at 06:02 By Help Net Security Despite its importance, patching can be challenging for organizations due to factors such as the sheer volume of patches released by software vendors, compatibility issues with existing systems, and the need to balance security with operational continuity. To ensure effective patch management,

React to this headline:

Loading spinner

Enhancing security through proactive patch management Read More »

Key areas that will define the intersection of AI and DevOps

Key areas that will define the intersection of AI and DevOps 2024-03-01 at 07:33 By Help Net Security Eficode research indicates that 96% of developers use AI tools, with most coders bypassing security policies to use them. With no standardized AI tool regulations, researchers advocate for stronger governance frameworks and AI security policies in organizations’

React to this headline:

Loading spinner

Key areas that will define the intersection of AI and DevOps Read More »

Inside the book: Androids – The Team That Built the Android Operating System

Inside the book: Androids – The Team That Built the Android Operating System 2024-02-29 at 07:03 By Help Net Security In 2004, Android was two people who wanted to build camera software but couldn’t get investors interested. Android is a large team at Google today, delivering an OS to over 3 billion devices worldwide. In

React to this headline:

Loading spinner

Inside the book: Androids – The Team That Built the Android Operating System Read More »

Preparing for the NIS2 Directive

Preparing for the NIS2 Directive 2024-02-28 at 08:01 By Help Net Security The EU’s NIS Directive (Directive on security of network and information systems) was established to create a higher level of cybersecurity and resilience within organizations across the member states. It was updated in January 2023 to bring more organizations into scope. Companies –

React to this headline:

Loading spinner

Preparing for the NIS2 Directive Read More »

Does AI remediation spell the end for developers in 2024?

Does AI remediation spell the end for developers in 2024? 2024-02-27 at 07:03 By Help Net Security Big tech firms are already rolling out AI remediation tools to prevent developers from introducing security risks into the software development lifecycle (SDLC). In this Help Net Security video, Matias Madou, CTO at Secure Code Warrior, discusses how

React to this headline:

Loading spinner

Does AI remediation spell the end for developers in 2024? Read More »

Escalating cyber threats spark demand for stronger regulations

Escalating cyber threats spark demand for stronger regulations 2024-02-26 at 06:32 By Help Net Security As the frequency and sophistication of cyber threats continue to escalate, the need for robust cybersecurity regulations has never been more critical. In this Help Net Security round-up, we present segments from previously recorded videos in which cybersecurity experts underscore

React to this headline:

Loading spinner

Escalating cyber threats spark demand for stronger regulations Read More »

Wire fraud scams escalate in real estate deals

Wire fraud scams escalate in real estate deals 2024-02-22 at 07:01 By Help Net Security In this Help Net Security video, Tyler Adams, CEO at CertifID, illustrates how the real estate sector needs to invest significant effort in educating consumers and implementing protective measures to safeguard real estate transactions. Recent CertifID research found that median

React to this headline:

Loading spinner

Wire fraud scams escalate in real estate deals Read More »

A closer look at Israeli cybersecurity funding and M&A activity in 2023

A closer look at Israeli cybersecurity funding and M&A activity in 2023 2024-02-21 at 07:01 By Help Net Security Last year was challenging for the global market, and the market downturn greatly affected even the historically resilient cybersecurity ecosystem. In this Help Net Security video, Merav Ben Avi, Content Manager at YL Ventures, talks about

React to this headline:

Loading spinner

A closer look at Israeli cybersecurity funding and M&A activity in 2023 Read More »

Why identity fraud costs organizations millions

Why identity fraud costs organizations millions 2024-02-20 at 07:01 By Help Net Security 92% of respondents to a recent report shared that their organization had been a victim of identity fraud, costing an average of $4.3 million over the last 12 months. Even so, only 40% stated identity verification as a top identity challenge, noting

React to this headline:

Loading spinner

Why identity fraud costs organizations millions Read More »

The double-edged sword of zero trust

The double-edged sword of zero trust 2024-02-19 at 06:01 By Help Net Security In an era defined by relentless cyber threats and evolving attack vectors, traditional security models are proving increasingly inadequate to safeguard sensitive information. Unlike conventional systems that often rely on perimeter defenses, zero trust adopts a more discerning philosophy, treating every user,

React to this headline:

Loading spinner

The double-edged sword of zero trust Read More »

Cybersecurity sectors adjust as DDoS attacks reach new heights

Cybersecurity sectors adjust as DDoS attacks reach new heights 2024-02-16 at 07:05 By Help Net Security In this Help Net Security video, Andrey Slastenov, Head of Security Department at Gcore, discusses the findings of their latest report that provide insights into the current state of the DDoS protection market and cybersecurity trends. Key highlights from

React to this headline:

Loading spinner

Cybersecurity sectors adjust as DDoS attacks reach new heights Read More »

Collaboration at the core: The interconnectivity of ITOps and security

Collaboration at the core: The interconnectivity of ITOps and security 2024-02-15 at 07:01 By Help Net Security In this Help Net Security video, Krista Macomber, Research Director at The Futurum Group, discusses how IT and security teams increasingly unite against cyber threats. Organizations are still struggling with the issue of disjointed data protection solutions, leading

React to this headline:

Loading spinner

Collaboration at the core: The interconnectivity of ITOps and security Read More »

How to take control of personal data

How to take control of personal data 2024-02-14 at 07:01 By Help Net Security Cybercriminals increasingly use open-source intelligence (OSINT) to craft convincing backstories, often by mining social media profiles for details on a target’s profession, interests, and routines. Armed with these personal insights, these malicious actors leverage chatbots to compose highly persuasive messages. Additionally,

React to this headline:

Loading spinner

How to take control of personal data Read More »

How purple teaming enhances inter-team collaboration and effectiveness in cybersecurity

How purple teaming enhances inter-team collaboration and effectiveness in cybersecurity 2024-02-13 at 07:01 By Help Net Security In this Help Net Security video, Andrew Costis, Chapter Lead of the Adversary Research Team at AttackIQ, discusses how purple teaming allows security teams to break down barriers between teams and increase operational effectiveness. It’s no longer about

React to this headline:

Loading spinner

How purple teaming enhances inter-team collaboration and effectiveness in cybersecurity Read More »

Hacking the flow: The consequences of compromised water systems

Hacking the flow: The consequences of compromised water systems 2024-02-12 at 07:31 By Help Net Security In this Help Net Security video, Andy Thompson, Offensive Cybersecurity Research Evangelist at CyberArk, discusses the dire consequences of hacking water systems and why their cybersecurity must be prioritized. From contaminating water supplies to disrupting essential services, the impact

React to this headline:

Loading spinner

Hacking the flow: The consequences of compromised water systems Read More »

2024 cybersecurity outlook: A wave of global threats on the horizon

2024 cybersecurity outlook: A wave of global threats on the horizon 2024-02-12 at 06:02 By Help Net Security 2024 is expected to witness a surge in cyberattacks driven by global events and the widespread accessibility of advanced technologies. In this Help Net Security round-up, we present segments from previously recorded videos where cybersecurity experts discuss

React to this headline:

Loading spinner

2024 cybersecurity outlook: A wave of global threats on the horizon Read More »

Scroll to Top