Video

Examining the long-term effects of data privacy violations

Examining the long-term effects of data privacy violations 12/06/2023 at 07:02 By Help Net Security Regulatory bodies are taking potential data privacy violations much more seriously this year after a relatively quiet period that followed the enactment of regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). We […]

React to this headline:

Loading spinner

Examining the long-term effects of data privacy violations Read More »

Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition

Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition 09/06/2023 at 07:02 By Help Net Security In this Help Net Security video interview, Alan Watkins, CIS Controls Ambassador, CIS, talks about his new book – Creating a Small Business Cybersecurity Program, Second Edition. This book provides guidance and essential steps small businesses with

React to this headline:

Loading spinner

Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition Read More »

The evolution of DDoS attacks in 2023

The evolution of DDoS attacks in 2023 08/06/2023 at 07:10 By Help Net Security In this Help Net Security video, Mattias Fridström, Chief Evangelist at Arelion, talks about the DDoS threat landscape during 2023. DDoS attacks reflect significant geo-political challenges and social tensions and have become an increasingly important part of the hybrid warfare arsenal.

React to this headline:

Loading spinner

The evolution of DDoS attacks in 2023 Read More »

Embracing realistic simulations in cybersecurity training programs

Embracing realistic simulations in cybersecurity training programs 07/06/2023 at 07:09 By Help Net Security In this Help Net Security video, Ed Adams, CEO of Security Innovation, discusses the shifts in cybersecurity training. 60% of companies now include realistic simulations in their cybersecurity training programs compared to 36% in 2020. According to Security Innovation research, organizations

React to this headline:

Loading spinner

Embracing realistic simulations in cybersecurity training programs Read More »

Generative AI’s influence on data governance and compliance

Generative AI’s influence on data governance and compliance 06/06/2023 at 07:02 By Help Net Security In this Help Net Security video, Michael Rinehart, VP of Artificial Intelligence at Securiti.ai, discusses a dark side to generative AI that isn’t talked about enough. Organizations must remember that anything that goes into the learning process can never be

React to this headline:

Loading spinner

Generative AI’s influence on data governance and compliance Read More »

How fraudsters undermine text passcodes

How fraudsters undermine text passcodes 05/06/2023 at 07:17 By Help Net Security Malicious bots are taking new forms – a burst of spam and scam text messages led to 18,000+ consumer complaints at the FCC last year. One of the newest scams – artificial inflation of traffic (AIT) – targets the SMS authentication codes sent

React to this headline:

Loading spinner

How fraudsters undermine text passcodes Read More »

Introducing the book: Cybersecurity First Principles

Introducing the book: Cybersecurity First Principles 02/06/2023 at 07:42 By Mirko Zorz In this Help Net Security video interview, Rick Howard, CSO of N2K, Chief Analyst, and Senior Fellow at the Cyberwire, discusses his book – Cybersecurity First Principles: A Reboot of Strategy and Tactics. In the book, Howard challenges the conventional wisdom of current

React to this headline:

Loading spinner

Introducing the book: Cybersecurity First Principles Read More »

Disaster recovery challenges enterprise CISOs face

Disaster recovery challenges enterprise CISOs face 01/06/2023 at 07:20 By Help Net Security An essential aspect of organizational operations is effectively responding to and returning from a disruptive event, commonly called disaster recovery. The primary objective of DR techniques is to restore the utilization of crucial systems and IT infrastructure following a disaster. To proactively

React to this headline:

Loading spinner

Disaster recovery challenges enterprise CISOs face Read More »

Fighting ransomware: Perspectives from cybersecurity professionals

Fighting ransomware: Perspectives from cybersecurity professionals 01/06/2023 at 06:32 By Help Net Security Ransomware has become an ever-present threat to individuals, businesses, and even entire nations. In this Help Net Security round-up, we present parts of previously recorded videos from experts in the field that shed light on the pressing ransomware issues. Complete videos David

React to this headline:

Loading spinner

Fighting ransomware: Perspectives from cybersecurity professionals Read More »

Managing mental health in cybersecurity

Managing mental health in cybersecurity 31/05/2023 at 07:01 By Help Net Security In this Help Net Security video, Jason Lewkowicz, Chief Services Officer at Optiv, discusses mental health in cybersecurity, which needs more attention. There is a confluence of factors – from the cybersecurity talent shortage and reductions in force to volatile financial markets and

React to this headline:

Loading spinner

Managing mental health in cybersecurity Read More »

The root causes of API incidents and data breaches

The root causes of API incidents and data breaches 30/05/2023 at 07:40 By Help Net Security API calls make up the majority of our digital lives. Take, for example, the everyday use of a cloud-based food delivery app, which could involve up to 25 API calls. Between the order being placed, transmission to the restaurant,

React to this headline:

Loading spinner

The root causes of API incidents and data breaches Read More »

CISO-approved strategies for software supply chain security

CISO-approved strategies for software supply chain security 29/05/2023 at 08:48 By Help Net Security Integrating proprietary and open-source code, APIs, user interfaces, application behavior, and deployment workflows creates an intricate composition in modern applications. Any vulnerabilities within this software supply chain can jeopardize your and your customers’ safety. In this Help Net Security video, Tim

React to this headline:

Loading spinner

CISO-approved strategies for software supply chain security Read More »

Strengthening travel safety protocols with ISO 31030

Strengthening travel safety protocols with ISO 31030 26/05/2023 at 07:20 By Help Net Security In this Help Net Security video, Tracy Reinhold, Chief Security Officer at Everbridge, talks about ISO 31030, the officially recognized International Standard for travel risk management, guiding how to manage risks to organizations and travelers. The global pandemic has been the

React to this headline:

Loading spinner

Strengthening travel safety protocols with ISO 31030 Read More »

How smart bots are infecting and exploiting the internet

How smart bots are infecting and exploiting the internet 25/05/2023 at 07:15 By Help Net Security According to Imperva, bad bot traffic grew to 30.2%, a 2.5% increase over 2021. In this Help Net Security video, Lynn Marks, Senior Product Manager at Imperva, discusses malicious bot activity. This is a substantial threat for businesses, leading

React to this headline:

Loading spinner

How smart bots are infecting and exploiting the internet Read More »

CISO-level tips for securing corporate data in the cloud

CISO-level tips for securing corporate data in the cloud 24/05/2023 at 07:17 By Help Net Security The presence of each third-party application increases the potential for attacks, particularly when end users install them without proper oversight or approval. IT security teams face challenges in obtaining comprehensive knowledge about the apps connected to their corporate SaaS

React to this headline:

Loading spinner

CISO-level tips for securing corporate data in the cloud Read More »

Gap between OT security assumptions and reality

Gap between OT security assumptions and reality 23/05/2023 at 07:02 By Help Net Security In the fast-evolving landscape of technology and connectivity, ensuring the security of operational technology (OT) systems has become a paramount concern for organizations worldwide. In this Help Net Security video, Daniel Bren, CEO at OTORIO, discusses a significant discrepancy between how

React to this headline:

Loading spinner

Gap between OT security assumptions and reality Read More »

How generative AI is reshaping the identity verification landscape

How generative AI is reshaping the identity verification landscape 22/05/2023 at 07:32 By Help Net Security The identity verification market is experiencing a significant surge in growth. In recent years, many solutions have emerged to assist businesses in establishing trust and facilitating remote user onboarding. This demand arises from the alarming rise in identity fraud,

React to this headline:

Loading spinner

How generative AI is reshaping the identity verification landscape Read More »

How continuous security monitoring is changing the compliance game

How continuous security monitoring is changing the compliance game 22/05/2023 at 07:01 By Help Net Security Managing compliance doesn’t have to be draining, time-consuming, or overly complicated. In this Help Net Security video, Wesley Van Zyl, Senior Manager, Compliance Success at Scytale, discusses how keeping track of all your security controls can be challenging, particularly

React to this headline:

Loading spinner

How continuous security monitoring is changing the compliance game Read More »

Exploring the tactics of phishing and scam websites in 2023

Exploring the tactics of phishing and scam websites in 2023 19/05/2023 at 07:02 By Help Net Security Phishing scams pose an escalating danger as cybercriminals employ increasingly sophisticated techniques, rendering their detection and prevention more challenging. In this Help Net Security video, Abhilash Garimella, Head of Research at Bolster, talks about the evolution of phishing

React to this headline:

Loading spinner

Exploring the tactics of phishing and scam websites in 2023 Read More »

Introducing Permit.io: Simplifying access control and policy management for developers

Introducing Permit.io: Simplifying access control and policy management for developers 18/05/2023 at 08:00 By Zeljka Zorz In this Help Net Security video interview, Or Weis, Co-Founder and CEO of Permit.io, discusses an innovative approach to managing permissions and access control within applications. We will explore policy as code and how it addresses organizations’ challenges in

React to this headline:

Loading spinner

Introducing Permit.io: Simplifying access control and policy management for developers Read More »

Scroll to Top