Video

Black Hat USA 2023 video walkthrough

Black Hat USA 2023 video walkthrough 11/08/2023 at 15:04 By Help Net Security Help Net Security is in Las Vegas this week for Black Hat USA 2023, and this video provides a closer look at the event. The exhibitors featured in this video are: 1Password, Aqua Security, CISA, Cisco, CyberFOX, Darktrace, Dasera, Fortanix, Fortinet, Fortra, […]

React to this headline:

Loading spinner

Black Hat USA 2023 video walkthrough Read More »

How to accelerate and access DDoS protection services using GRE

How to accelerate and access DDoS protection services using GRE 11/08/2023 at 06:31 By Help Net Security As we entered 2023, the cybersecurity landscape witnessed an increase in sophisticated, high-volume attacks, according to Gcore. The maximum attack power rose from 600 to 800 Gbps. UDP flood attacks were most common and amounted to 52% of

React to this headline:

Loading spinner

How to accelerate and access DDoS protection services using GRE Read More »

What to know about FedRAMP Rev. 5 Baselines

What to know about FedRAMP Rev. 5 Baselines 10/08/2023 at 06:31 By Help Net Security In this Help Net Security video, Kaus Phaltankar, CEO at Caveonix, discusses how the recent approval of the FedRAMP Rev. 5 Baselines is a significant step forward in the cloud security and compliance domain. The implications for CSPs and third-party

React to this headline:

Loading spinner

What to know about FedRAMP Rev. 5 Baselines Read More »

Dark web activity targeting the financial sector

Dark web activity targeting the financial sector 08/08/2023 at 07:01 By Help Net Security In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses threats against the financial sector. Threat actors will invariably target banks, yet by keeping an eye on the dark web, these institutions can identify illegal

React to this headline:

Loading spinner

Dark web activity targeting the financial sector Read More »

8 free cybersecurity documentaries you can watch right now

8 free cybersecurity documentaries you can watch right now 07/08/2023 at 08:05 By Help Net Security The line between physical and digital safety continues to blur, making cybersecurity a universal concern. The intricacies of cybersecurity can often feel esoteric, leaving many outside the industry feeling daunted. However, with increasing resources becoming available, getting a handle

React to this headline:

Loading spinner

8 free cybersecurity documentaries you can watch right now Read More »

Navigating the gray zone of ransomware payment practices

Navigating the gray zone of ransomware payment practices 07/08/2023 at 06:33 By Help Net Security Ransomware remains a lucrative tool for cybercriminals as attackers continue to target a wide array of businesses. In response to this growing threat, an increasing number of organizations are compelled to meet ransom demands, perceiving it as their only viable

React to this headline:

Loading spinner

Navigating the gray zone of ransomware payment practices Read More »

Unraveling the importance of software supply chain security

Unraveling the importance of software supply chain security 07/08/2023 at 06:06 By Help Net Security The software supply chain encompasses the entire lifecycle of a software product, from its conception and development to its distribution and deployment. It involves a complex network of suppliers, vendors, developers, integrators, and users, making it susceptible to many potential

React to this headline:

Loading spinner

Unraveling the importance of software supply chain security Read More »

How local governments can combat cybercrime

How local governments can combat cybercrime 03/08/2023 at 07:01 By Help Net Security Amid a recent uptick in cybercrime on local governments, cities have been left to recover for months after the initial attack. For example, leaders in Dallas, Texas are ready to spend months recovering from an attack that hindered the city’s 911 emergency

React to this headline:

Loading spinner

How local governments can combat cybercrime Read More »

Strategies for ensuring compliance and security in outdated healthcare IT systems

Strategies for ensuring compliance and security in outdated healthcare IT systems 01/08/2023 at 07:02 By Help Net Security With the average price tag for a healthcare data breach at an all-time high, the overall financial damage to an organization is high regarding economic loss and reputation repair. According to the Cybersecurity and Infrastructure Security Agency

React to this headline:

Loading spinner

Strategies for ensuring compliance and security in outdated healthcare IT systems Read More »

Open-source security challenges and complexities

Open-source security challenges and complexities 31/07/2023 at 06:31 By Help Net Security Open source refers to software or technology that is made available to the public with its source code openly accessible, editable, and distributable. In other words, the source code contains the underlying programming instructions and is freely available for anyone to view, modify,

React to this headline:

Loading spinner

Open-source security challenges and complexities Read More »

National Cyber Strategy Implementation Plan: What you need to know

National Cyber Strategy Implementation Plan: What you need to know 28/07/2023 at 06:31 By Help Net Security The Biden-Harris Administration’s recently released National Cybersecurity Strategy calls for two fundamental shifts in how the United States allocates roles, responsibilities, and resources in cyberspace. In this Help Net Security video, Kelly Rozumalski, a Senior VP leading Booz

React to this headline:

Loading spinner

National Cyber Strategy Implementation Plan: What you need to know Read More »

CISOs gear up to combat the rising threat of B2B fraud

CISOs gear up to combat the rising threat of B2B fraud 27/07/2023 at 06:02 By Help Net Security The ongoing banking and economic turmoil has opened the floodgates to fraudsters. In this Help Net Security video, ex-British Intelligence officer Alex Beavan, Head of Ethics and Anti-Corruption at Convera, discusses how fraudsters target businesses and his

React to this headline:

Loading spinner

CISOs gear up to combat the rising threat of B2B fraud Read More »

Converging networking and security with SASE

Converging networking and security with SASE 25/07/2023 at 07:02 By Help Net Security While technology advancements and distributed workforces have created efficiencies and flexibility for companies, they’ve also created overcomplexity, which can increase security risk. 53% of senior IT decision-makers say their IT environment is more complex than it was two years ago. In this

React to this headline:

Loading spinner

Converging networking and security with SASE Read More »

Strengthening the weakest links in the digital supply chain

Strengthening the weakest links in the digital supply chain 24/07/2023 at 07:05 By Help Net Security In this Help Net Security video, Marc Gaffan, CEO at IONIX, discusses how businesses’ biggest cybersecurity mistake is not protecting the full external attack surface that continues to expand to include a businesses’ entire digital supply chain. This is

React to this headline:

Loading spinner

Strengthening the weakest links in the digital supply chain Read More »

Shaping the future of digital identity

Shaping the future of digital identity 24/07/2023 at 06:35 By Help Net Security Digital identity refers to the unique and electronically stored representation of an individual or entity’s personal information, characteristics, and attributes. It encompasses various digital identifiers, such as usernames, email addresses, biometric data, or government-issued IDs, that allow users to authenticate themselves online

React to this headline:

Loading spinner

Shaping the future of digital identity Read More »

How healthcare organizations should measure their device security success

How healthcare organizations should measure their device security success 21/07/2023 at 07:04 By Help Net Security In this Help Net Security video, Chris Westphal, Head of Product Marketing at Ordr, discusses how healthcare organizations should measure their device security success and where they should be concentrating their future security investments. The post How healthcare organizations

React to this headline:

Loading spinner

How healthcare organizations should measure their device security success Read More »

A fresh look at the current state of financial fraud

A fresh look at the current state of financial fraud 20/07/2023 at 07:02 By Help Net Security In this Help Net Security video, Greg Woolf, CEO at FiVerity, discusses how the emergence of sophisticated fraud tools powered by AI and recent upheavals in the banking sector have forged an ideal environment for financial fraud. This

React to this headline:

Loading spinner

A fresh look at the current state of financial fraud Read More »

What to do (and what not to do) after a data breach

What to do (and what not to do) after a data breach 19/07/2023 at 07:02 By Help Net Security Data breaches have been hitting the headlines left and right. Every time a breach occurs, the impacted organization’s response differs from the last. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead at

React to this headline:

Loading spinner

What to do (and what not to do) after a data breach Read More »

Real-world examples of quantum-based attacks

Real-world examples of quantum-based attacks 17/07/2023 at 07:02 By Help Net Security Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from various sources in ways even beyond what we’ve experienced with AI. In this Help Net Security video, Tommaso

React to this headline:

Loading spinner

Real-world examples of quantum-based attacks Read More »

Building resilience through DevSecOps

Building resilience through DevSecOps 17/07/2023 at 06:32 By Help Net Security DevSecOps, short for Development, Security, and Operations, is an approach that emphasizes the integration of security practices and principles into every stage of the software development lifecycle. It aims to bridge the gap between development teams, security teams, and operations teams, fostering collaboration and

React to this headline:

Loading spinner

Building resilience through DevSecOps Read More »

Scroll to Top