Video

CISOs gear up to combat the rising threat of B2B fraud

CISOs gear up to combat the rising threat of B2B fraud 27/07/2023 at 06:02 By Help Net Security The ongoing banking and economic turmoil has opened the floodgates to fraudsters. In this Help Net Security video, ex-British Intelligence officer Alex Beavan, Head of Ethics and Anti-Corruption at Convera, discusses how fraudsters target businesses and his […]

React to this headline:

Loading spinner

CISOs gear up to combat the rising threat of B2B fraud Read More »

Converging networking and security with SASE

Converging networking and security with SASE 25/07/2023 at 07:02 By Help Net Security While technology advancements and distributed workforces have created efficiencies and flexibility for companies, they’ve also created overcomplexity, which can increase security risk. 53% of senior IT decision-makers say their IT environment is more complex than it was two years ago. In this

React to this headline:

Loading spinner

Converging networking and security with SASE Read More »

Strengthening the weakest links in the digital supply chain

Strengthening the weakest links in the digital supply chain 24/07/2023 at 07:05 By Help Net Security In this Help Net Security video, Marc Gaffan, CEO at IONIX, discusses how businesses’ biggest cybersecurity mistake is not protecting the full external attack surface that continues to expand to include a businesses’ entire digital supply chain. This is

React to this headline:

Loading spinner

Strengthening the weakest links in the digital supply chain Read More »

Shaping the future of digital identity

Shaping the future of digital identity 24/07/2023 at 06:35 By Help Net Security Digital identity refers to the unique and electronically stored representation of an individual or entity’s personal information, characteristics, and attributes. It encompasses various digital identifiers, such as usernames, email addresses, biometric data, or government-issued IDs, that allow users to authenticate themselves online

React to this headline:

Loading spinner

Shaping the future of digital identity Read More »

How healthcare organizations should measure their device security success

How healthcare organizations should measure their device security success 21/07/2023 at 07:04 By Help Net Security In this Help Net Security video, Chris Westphal, Head of Product Marketing at Ordr, discusses how healthcare organizations should measure their device security success and where they should be concentrating their future security investments. The post How healthcare organizations

React to this headline:

Loading spinner

How healthcare organizations should measure their device security success Read More »

A fresh look at the current state of financial fraud

A fresh look at the current state of financial fraud 20/07/2023 at 07:02 By Help Net Security In this Help Net Security video, Greg Woolf, CEO at FiVerity, discusses how the emergence of sophisticated fraud tools powered by AI and recent upheavals in the banking sector have forged an ideal environment for financial fraud. This

React to this headline:

Loading spinner

A fresh look at the current state of financial fraud Read More »

What to do (and what not to do) after a data breach

What to do (and what not to do) after a data breach 19/07/2023 at 07:02 By Help Net Security Data breaches have been hitting the headlines left and right. Every time a breach occurs, the impacted organization’s response differs from the last. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead at

React to this headline:

Loading spinner

What to do (and what not to do) after a data breach Read More »

Real-world examples of quantum-based attacks

Real-world examples of quantum-based attacks 17/07/2023 at 07:02 By Help Net Security Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from various sources in ways even beyond what we’ve experienced with AI. In this Help Net Security video, Tommaso

React to this headline:

Loading spinner

Real-world examples of quantum-based attacks Read More »

Building resilience through DevSecOps

Building resilience through DevSecOps 17/07/2023 at 06:32 By Help Net Security DevSecOps, short for Development, Security, and Operations, is an approach that emphasizes the integration of security practices and principles into every stage of the software development lifecycle. It aims to bridge the gap between development teams, security teams, and operations teams, fostering collaboration and

React to this headline:

Loading spinner

Building resilience through DevSecOps Read More »

Attack Surface Management: Identify and protect the unknown

Attack Surface Management: Identify and protect the unknown 13/07/2023 at 07:33 By Help Net Security In this Help Net Security video, Brianna McGovern, Product Manager, Attack Surface Management, NetSPI, discusses Attack Surface Management (ASM). Attack Surface Management detects known, unknown, and potentially vulnerable public-facing assets and changes to your attack surface that may introduce risk.

React to this headline:

Loading spinner

Attack Surface Management: Identify and protect the unknown Read More »

Cybersecurity best practices while working in the summer

Cybersecurity best practices while working in the summer 11/07/2023 at 07:02 By Help Net Security IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy Ventura, Director, Security Strategy & Field CISO at ThreatX, discusses how employees

React to this headline:

Loading spinner

Cybersecurity best practices while working in the summer Read More »

Industry responses and strategies for navigating the tides of DDoS attacks

Industry responses and strategies for navigating the tides of DDoS attacks 11/07/2023 at 06:33 By Help Net Security It is important not to underestimate the potentially devastating impact of DDoS attacks. Organizations of all sizes should take proactive measures to mitigate and safeguard against DDoS attacks, ensuring the continuity and resilience of their operations. Throughout

React to this headline:

Loading spinner

Industry responses and strategies for navigating the tides of DDoS attacks Read More »

How ransomware impacts the healthcare industry

How ransomware impacts the healthcare industry 05/07/2023 at 07:02 By Help Net Security Healthcare continues to be one of the most attractive targets for cyberattackers, and the number of breaches affecting the industry is increasing yearly. In this Help Net Security video, Steve Gwizdala, VP of Healthcare at ForgeRock, discusses how vigilance and new ways

React to this headline:

Loading spinner

How ransomware impacts the healthcare industry Read More »

The rise in cyber extortion attacks and its impact on business security

The rise in cyber extortion attacks and its impact on business security 03/07/2023 at 07:08 By Help Net Security In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions. A recent report revealed that cyber extortion activity reached

React to this headline:

Loading spinner

The rise in cyber extortion attacks and its impact on business security Read More »

Micropatches: What they are and how they work

Micropatches: What they are and how they work 29/06/2023 at 07:02 By Help Net Security In this Help Net Security video, Mitja Kolsek, CEO at Acros Security, discusses micropatches, a solution to a huge security problem. With micropatches, there are no reboots or downtime when patching and no fear that an official update will break

React to this headline:

Loading spinner

Micropatches: What they are and how they work Read More »

The magic formula for big data companies to outshine the competition

The magic formula for big data companies to outshine the competition 28/06/2023 at 07:02 By Help Net Security In today’s data-driven world, organizations that can harness the power of big data and derive actionable insights are positioned to succeed. However, the sheer number of big data companies vying for attention has made it crucial for

React to this headline:

Loading spinner

The magic formula for big data companies to outshine the competition Read More »

How cyber insurance empowers CISOs

How cyber insurance empowers CISOs 27/06/2023 at 07:03 By Help Net Security In this Help Net Security video, Fawaz Rasheed, Field CISO at VMware, discusses how cyber insurance remains the high tide that rises ships. For organizations choosing to purchase cyber insurance, the requirements set forth towards them are beneficial in advancing their security program.

React to this headline:

Loading spinner

How cyber insurance empowers CISOs Read More »

A deep-dive demo of NetSPI’s Attack Surface Management (ASM) platform

A deep-dive demo of NetSPI’s Attack Surface Management (ASM) platform 27/06/2023 at 05:33 By Help Net Security Learn how NetSPI’s always-on solution allows companies to improve visibility, inventory, and understanding of known and unknown assets and exposures on their global attack surface and distill signal from noise. After all, the discovery of assets and vulnerabilities

React to this headline:

Loading spinner

A deep-dive demo of NetSPI’s Attack Surface Management (ASM) platform Read More »

How hardening Microsoft 365 tenants mitigates potential cloud attacks

How hardening Microsoft 365 tenants mitigates potential cloud attacks 26/06/2023 at 07:01 By Help Net Security Moving critical data and workloads to the cloud has significantly changed information security teams. But most don’t have the resources to be successful in their cloud attack modeling—not to mention the deployment of measurable controls to defend against these

React to this headline:

Loading spinner

How hardening Microsoft 365 tenants mitigates potential cloud attacks Read More »

Security investments that help companies navigate the macroeconomic climate

Security investments that help companies navigate the macroeconomic climate 23/06/2023 at 07:01 By Help Net Security As data transformation progresses, cyber attacks are among the most significant growing threats to the enterprise. As seen in the recent MOVEit situation, enterprises must immediately enact cybersecurity solutions that are right for them. Every enterprise is unique, so

React to this headline:

Loading spinner

Security investments that help companies navigate the macroeconomic climate Read More »

Scroll to Top