Video

What to do (and what not to do) after a data breach

What to do (and what not to do) after a data breach 19/07/2023 at 07:02 By Help Net Security Data breaches have been hitting the headlines left and right. Every time a breach occurs, the impacted organization’s response differs from the last. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead at […]

React to this headline:

Loading spinner

What to do (and what not to do) after a data breach Read More »

Real-world examples of quantum-based attacks

Real-world examples of quantum-based attacks 17/07/2023 at 07:02 By Help Net Security Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from various sources in ways even beyond what we’ve experienced with AI. In this Help Net Security video, Tommaso

React to this headline:

Loading spinner

Real-world examples of quantum-based attacks Read More »

Building resilience through DevSecOps

Building resilience through DevSecOps 17/07/2023 at 06:32 By Help Net Security DevSecOps, short for Development, Security, and Operations, is an approach that emphasizes the integration of security practices and principles into every stage of the software development lifecycle. It aims to bridge the gap between development teams, security teams, and operations teams, fostering collaboration and

React to this headline:

Loading spinner

Building resilience through DevSecOps Read More »

Attack Surface Management: Identify and protect the unknown

Attack Surface Management: Identify and protect the unknown 13/07/2023 at 07:33 By Help Net Security In this Help Net Security video, Brianna McGovern, Product Manager, Attack Surface Management, NetSPI, discusses Attack Surface Management (ASM). Attack Surface Management detects known, unknown, and potentially vulnerable public-facing assets and changes to your attack surface that may introduce risk.

React to this headline:

Loading spinner

Attack Surface Management: Identify and protect the unknown Read More »

Cybersecurity best practices while working in the summer

Cybersecurity best practices while working in the summer 11/07/2023 at 07:02 By Help Net Security IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy Ventura, Director, Security Strategy & Field CISO at ThreatX, discusses how employees

React to this headline:

Loading spinner

Cybersecurity best practices while working in the summer Read More »

Industry responses and strategies for navigating the tides of DDoS attacks

Industry responses and strategies for navigating the tides of DDoS attacks 11/07/2023 at 06:33 By Help Net Security It is important not to underestimate the potentially devastating impact of DDoS attacks. Organizations of all sizes should take proactive measures to mitigate and safeguard against DDoS attacks, ensuring the continuity and resilience of their operations. Throughout

React to this headline:

Loading spinner

Industry responses and strategies for navigating the tides of DDoS attacks Read More »

How ransomware impacts the healthcare industry

How ransomware impacts the healthcare industry 05/07/2023 at 07:02 By Help Net Security Healthcare continues to be one of the most attractive targets for cyberattackers, and the number of breaches affecting the industry is increasing yearly. In this Help Net Security video, Steve Gwizdala, VP of Healthcare at ForgeRock, discusses how vigilance and new ways

React to this headline:

Loading spinner

How ransomware impacts the healthcare industry Read More »

The rise in cyber extortion attacks and its impact on business security

The rise in cyber extortion attacks and its impact on business security 03/07/2023 at 07:08 By Help Net Security In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions. A recent report revealed that cyber extortion activity reached

React to this headline:

Loading spinner

The rise in cyber extortion attacks and its impact on business security Read More »

Micropatches: What they are and how they work

Micropatches: What they are and how they work 29/06/2023 at 07:02 By Help Net Security In this Help Net Security video, Mitja Kolsek, CEO at Acros Security, discusses micropatches, a solution to a huge security problem. With micropatches, there are no reboots or downtime when patching and no fear that an official update will break

React to this headline:

Loading spinner

Micropatches: What they are and how they work Read More »

The magic formula for big data companies to outshine the competition

The magic formula for big data companies to outshine the competition 28/06/2023 at 07:02 By Help Net Security In today’s data-driven world, organizations that can harness the power of big data and derive actionable insights are positioned to succeed. However, the sheer number of big data companies vying for attention has made it crucial for

React to this headline:

Loading spinner

The magic formula for big data companies to outshine the competition Read More »

How cyber insurance empowers CISOs

How cyber insurance empowers CISOs 27/06/2023 at 07:03 By Help Net Security In this Help Net Security video, Fawaz Rasheed, Field CISO at VMware, discusses how cyber insurance remains the high tide that rises ships. For organizations choosing to purchase cyber insurance, the requirements set forth towards them are beneficial in advancing their security program.

React to this headline:

Loading spinner

How cyber insurance empowers CISOs Read More »

A deep-dive demo of NetSPI’s Attack Surface Management (ASM) platform

A deep-dive demo of NetSPI’s Attack Surface Management (ASM) platform 27/06/2023 at 05:33 By Help Net Security Learn how NetSPI’s always-on solution allows companies to improve visibility, inventory, and understanding of known and unknown assets and exposures on their global attack surface and distill signal from noise. After all, the discovery of assets and vulnerabilities

React to this headline:

Loading spinner

A deep-dive demo of NetSPI’s Attack Surface Management (ASM) platform Read More »

How hardening Microsoft 365 tenants mitigates potential cloud attacks

How hardening Microsoft 365 tenants mitigates potential cloud attacks 26/06/2023 at 07:01 By Help Net Security Moving critical data and workloads to the cloud has significantly changed information security teams. But most don’t have the resources to be successful in their cloud attack modeling—not to mention the deployment of measurable controls to defend against these

React to this headline:

Loading spinner

How hardening Microsoft 365 tenants mitigates potential cloud attacks Read More »

Security investments that help companies navigate the macroeconomic climate

Security investments that help companies navigate the macroeconomic climate 23/06/2023 at 07:01 By Help Net Security As data transformation progresses, cyber attacks are among the most significant growing threats to the enterprise. As seen in the recent MOVEit situation, enterprises must immediately enact cybersecurity solutions that are right for them. Every enterprise is unique, so

React to this headline:

Loading spinner

Security investments that help companies navigate the macroeconomic climate Read More »

Understanding the interplay between DevOps productivity and security

Understanding the interplay between DevOps productivity and security 22/06/2023 at 07:09 By Help Net Security Not only are macroeconomic headwinds causing more significant stress for security and DevOps teams, but the increasing number of threats against shrinking teams is causing an uneven playing field. In this Help Net Security video, Ev Kontsevoy, CEO at Teleport,

React to this headline:

Loading spinner

Understanding the interplay between DevOps productivity and security Read More »

Infosecurity Europe 2023 video walkthrough

Infosecurity Europe 2023 video walkthrough 21/06/2023 at 11:24 By Help Net Security Infosecurity Europe 2023 is taking place in London this week, and this video provides a closer look at this year’s event. The post Infosecurity Europe 2023 video walkthrough appeared first on Help Net Security. This article is an excerpt from Help Net Security

React to this headline:

Loading spinner

Infosecurity Europe 2023 video walkthrough Read More »

The limitations of shifting left in application security

The limitations of shifting left in application security 21/06/2023 at 07:40 By Help Net Security In this Help Net Security video, Jacob Garrison, Security Research for Bionic, explains the limitations of shifting left in application security. Key factors hindering the effectiveness of shifting left: Achieving 50%+ application test coverage is unrealistic, especially in microservices environments

React to this headline:

Loading spinner

The limitations of shifting left in application security Read More »

The future of passwords and authentication

The future of passwords and authentication 20/06/2023 at 06:31 By Help Net Security In this Help Net Security video, Michael Crandell, CEO of Bitwarden, discusses the future of passwords and authentication. Although interest in passwordless technology, which aims to eliminate the need for passwords, is relatively low, 65% of consumers are receptive to using new

React to this headline:

Loading spinner

The future of passwords and authentication Read More »

What if the browser was designed for the enterprise?

What if the browser was designed for the enterprise? 20/06/2023 at 05:47 By Help Net Security Bradon Rogers, Chief Customer Officer at Island, provides an overview of the Island Enterprise Browser. Learn more at Infosecurity Europe 2023 – June 20-22, 2023. The post What if the browser was designed for the enterprise? appeared first on

React to this headline:

Loading spinner

What if the browser was designed for the enterprise? Read More »

How to simplify the process of compliance with U.S. Executive Order 14028

How to simplify the process of compliance with U.S. Executive Order 14028 19/06/2023 at 07:03 By Help Net Security In this Help Net Security video, Nick Mistry, SVP and CISO at Lineaje, offers tips to simplify the process of compliance with U.S. Executive Order 14028. A key part of U.S. Executive Order 14028 is for

React to this headline:

Loading spinner

How to simplify the process of compliance with U.S. Executive Order 14028 Read More »

Scroll to Top