Video

Transforming cybersecurity from reactive to proactive with attack path analysis

Transforming cybersecurity from reactive to proactive with attack path analysis 17/11/2023 at 08:03 By Help Net Security An attack path is important to prioritize potential risks in cloud environments. The attack path offers the ability to look at cloud environments from the attacker’s perspective. With today’s general awareness and concerted effort toward cybersecurity, cybercriminals rarely […]

React to this headline:

Loading spinner

Transforming cybersecurity from reactive to proactive with attack path analysis Read More »

Cyber insurance predictions for 2024

Cyber insurance predictions for 2024 16/11/2023 at 08:01 By Help Net Security In this Help Net Security video, Dara Gibson, Senior Cyber Insurance Manager at Optiv, discusses cyber insurance and what we should expect to see in 2024: Ransomware, BEC, and pixel privacy claims will remain at the forefront of cyber insurance claims Cyber insurance

React to this headline:

Loading spinner

Cyber insurance predictions for 2024 Read More »

Enhancing mainframe security with proven best practices

Enhancing mainframe security with proven best practices 15/11/2023 at 08:35 By Help Net Security Mainframe systems have served as the bedrock of enterprise networks for years, standing unmatched in terms of reliability, scalability, and data protection. However, security risks have become a pressing concern as the digital landscape evolves, emerging practices like DevOps, the rise

React to this headline:

Loading spinner

Enhancing mainframe security with proven best practices Read More »

Using real-time monitoring to identify and mitigate threats

Using real-time monitoring to identify and mitigate threats 14/11/2023 at 08:02 By Help Net Security From identifying unusual behavior patterns to detecting unauthorized access, real-time monitoring provides a view of your digital environment, ensuring that threats are spotted and dealt with before they can cause harm. In this Help Net Security video, Costa Tsaousis, CEO

React to this headline:

Loading spinner

Using real-time monitoring to identify and mitigate threats Read More »

Building resilience to shield your digital transformation from cyber threats

Building resilience to shield your digital transformation from cyber threats 13/11/2023 at 08:01 By Help Net Security Digital transformation projects are top of mind for enterprises. 91% of businesses are currently engaged in some form of digital initiative. Yet, the average cost of a failed, delayed, or scaled-back digital transformation project is more than $4

React to this headline:

Loading spinner

Building resilience to shield your digital transformation from cyber threats Read More »

Why backup matters more than ever

Why backup matters more than ever 13/11/2023 at 07:05 By Help Net Security Often overlooked but critically essential, backup lies at the core of data security and business continuity. However, data is also susceptible to a myriad of threats, ranging from hardware failures and accidental deletions to malicious cyberattacks. Whether you’re an individual safeguarding cherished

React to this headline:

Loading spinner

Why backup matters more than ever Read More »

Rethinking cyber risk: The case against spreadsheets

Rethinking cyber risk: The case against spreadsheets 10/11/2023 at 08:02 By Help Net Security In this Help Net Security video, Christina Hoefer, VP of Global Industrial Enterprise at Forescout, discusses why it is time for manufacturers/OT security leaders to “toss the spreadsheet” regarding their traditional methods of tracking data for cyber risk assessments. She addresses

React to this headline:

Loading spinner

Rethinking cyber risk: The case against spreadsheets Read More »

Unpacking the challenges of anti-money laundering obligations

Unpacking the challenges of anti-money laundering obligations 09/11/2023 at 08:32 By Help Net Security When managing anti-money laundering (AML) obligations, many challenger banks turn to basic or unproven in-house risk management solutions. Although these solutions can, in some ways, be innovative, they are often built quickly and lack thorough testing, leading to potential vulnerabilities. In

React to this headline:

Loading spinner

Unpacking the challenges of anti-money laundering obligations Read More »

AI-assisted coding and its impact on developers

AI-assisted coding and its impact on developers 08/11/2023 at 08:02 By Help Net Security The emergence of AI has put into question the roles of software developers everywhere. In this Help Net Security video, Cat Hicks, VP of Research Insights at Pluralsight, discusses pressing questions that engineering organizations face regarding the rapidly-changing possibilities of AI-assisted

React to this headline:

Loading spinner

AI-assisted coding and its impact on developers Read More »

How AI is transforming consumer privacy expectations

How AI is transforming consumer privacy expectations 07/11/2023 at 08:01 By Help Net Security Consumers are concerned about their privacy with AI. Cisco discovered that 60% had lost trust in organizations due to their AI use. In this Help Net Security video, Robert Waitman, Director of Cisco’s Privacy Center of Excellence, discusses consumers’ perceptions and

React to this headline:

Loading spinner

How AI is transforming consumer privacy expectations Read More »

Securing data at the intersection of the CISO and CDO

Securing data at the intersection of the CISO and CDO 06/11/2023 at 08:34 By Help Net Security Two groups in particular play a key and critical role in ensuring data governance and security: the CISO and the CDO. CISOs are responsible for identifying and managing risks associated with data security, while CDOs are responsible for

React to this headline:

Loading spinner

Securing data at the intersection of the CISO and CDO Read More »

The role of Kubernetes in modern app management

The role of Kubernetes in modern app management 06/11/2023 at 07:03 By Help Net Security Kubernetes, often abbreviated as K8s, is an open-source container orchestration platform that has redefined the way modern applications are developed, deployed, and managed. Born out of Google’s internal container orchestration system, Kubernetes has become the de facto standard for containerized

React to this headline:

Loading spinner

The role of Kubernetes in modern app management Read More »

How cybercriminals adapt and thrive amidst changing consumer trends

How cybercriminals adapt and thrive amidst changing consumer trends 03/11/2023 at 08:36 By Help Net Security The email threat landscape is experiencing a profound transformation, adapting to new challenges and exploiting emerging vulnerabilities with speed and sophistication. In this Help Net Security video, Usman Choudhary, CPTO at VIPRE Security Group, discusses how cybercriminals modify their

React to this headline:

Loading spinner

How cybercriminals adapt and thrive amidst changing consumer trends Read More »

Why legacy system patching can’t wait

Why legacy system patching can’t wait 02/11/2023 at 07:32 By Help Net Security The persistent neglect of patching legacy systems is plaguing critical infrastructure and industries. The consequences of such neglect can be damaging to organizations, ranging from costly security vulnerabilities to compliance risk and operational inefficiencies. Thus, the question remains: why is the process

React to this headline:

Loading spinner

Why legacy system patching can’t wait Read More »

How security observability can help you fight cyber attacks

How security observability can help you fight cyber attacks 31/10/2023 at 08:31 By Help Net Security Security observability uses the external outputs of a system, its logs, metrics, and traces to infer risk, monitor threats, and alert on breaches. Security professionals use this close observation of system behavior to detect, understand, and stop new and

React to this headline:

Loading spinner

How security observability can help you fight cyber attacks Read More »

Finding the right approach to security awareness

Finding the right approach to security awareness 30/10/2023 at 09:02 By Help Net Security As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become increasingly vital. Security awareness training is essential and must be a live, evolving process. In this Help Net Security

React to this headline:

Loading spinner

Finding the right approach to security awareness Read More »

IoT’s convenience comes with cybersecurity challenges

IoT’s convenience comes with cybersecurity challenges 30/10/2023 at 07:03 By Help Net Security The rapid proliferation of Internet of Things (IoT) devices has ushered in a new era of connectivity and convenience, transforming the way we live and work. However, this interconnectivity has also given rise to a host of cybersecurity challenges and vulnerabilities. Protecting

React to this headline:

Loading spinner

IoT’s convenience comes with cybersecurity challenges Read More »

Strategies to overcome cybersecurity misconceptions

Strategies to overcome cybersecurity misconceptions 25/10/2023 at 07:02 By Help Net Security Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net Security video, Kevin Kirkwood, Deputy CISO at LogRhythm, stresses that one of the most significant pitfalls

React to this headline:

Loading spinner

Strategies to overcome cybersecurity misconceptions Read More »

Navigating OT/IT convergence and securing ICS environments

Navigating OT/IT convergence and securing ICS environments 23/10/2023 at 07:33 By Help Net Security Escalating threats to operational technology (OT) have prompted an increasing number of global enterprises to adopt sophisticated technologies and services to enhance the security of their assets. In this Help Net Security video, Christopher Warner, Senior GRC-OT Security Consultant at GuidePoint

React to this headline:

Loading spinner

Navigating OT/IT convergence and securing ICS environments Read More »

Cyberattacks put healthcare organizations on high alert

Cyberattacks put healthcare organizations on high alert 23/10/2023 at 06:04 By Help Net Security Healthcare organizations have become prime targets for cybercriminals due to the immense value of their data, including patient records, sensitive medical information, and financial data. The importance of protecting this invaluable information, alongside ensuring the seamless operation of medical devices and

React to this headline:

Loading spinner

Cyberattacks put healthcare organizations on high alert Read More »

Scroll to Top