Video

Key cybersecurity predictions for 2025

Key cybersecurity predictions for 2025 2024-11-06 at 06:33 By Help Net Security In this Help Net Security video, Chris Gibson, CEO at FIRST, discusses the evolving threat landscape and provides a unique take on where data breaches and cyber attacks will be in 2025. The post Key cybersecurity predictions for 2025 appeared first on Help […]

React to this headline:

Loading spinner

Key cybersecurity predictions for 2025 Read More »

Cybersecurity in crisis: Are we ready for what’s coming?

Cybersecurity in crisis: Are we ready for what’s coming? 2024-11-04 at 06:35 By Help Net Security In this Help Net Security video, James Edgar, CISO at Corpay, reveals insights into cybersecurity health, concerns, challenges, and other considerations for building a solid defense program. Key insights revealed in Corpay’s 2024 State of Business Cybersecurity Report: 67%

React to this headline:

Loading spinner

Cybersecurity in crisis: Are we ready for what’s coming? Read More »

Threat actors are stepping up their tactics to bypass email protections

Threat actors are stepping up their tactics to bypass email protections 2024-11-01 at 06:33 By Help Net Security Although most organizations use emails with built-in security features that filter out suspicious messages, criminals always find a way to bypass these systems. With the development of AI technology, phishing is becoming increasingly difficult to recognize, allowing

React to this headline:

Loading spinner

Threat actors are stepping up their tactics to bypass email protections Read More »

Why cyber tools fail SOC teams

Why cyber tools fail SOC teams 2024-10-31 at 06:34 By Help Net Security A recent Vectra AI report highlights a growing distrust of threat detection tools. 47% of respondents note they do not trust their tools to work the way they need them to. Moreover, 60% of SOC practitioners say security vendors flood them with

React to this headline:

Loading spinner

Why cyber tools fail SOC teams Read More »

The state of password security in 2024

The state of password security in 2024 2024-10-29 at 06:33 By Help Net Security In this Help Net Security video, John Bennett, CEO at Dashlane, discusses their recent Global Password Health Score Report, detailing the global state of password health and hygiene. Poor security habits like password reuse remain widespread. With passwordless technologies like passkeys

React to this headline:

Loading spinner

The state of password security in 2024 Read More »

Adversarial groups adapt to exploit systems in new ways

Adversarial groups adapt to exploit systems in new ways 2024-10-28 at 06:36 By Help Net Security In this Help Net Security video, Jake King, Head of Threat & Security Intelligence at Elastic, discusses the key findings from the 2024 Elastic Global Threat Report. Adversaries are utilizing off-the-shelf tools Offensive security tools (OSTs), including Cobalt Strike

React to this headline:

Loading spinner

Adversarial groups adapt to exploit systems in new ways Read More »

How to fend off a quantum computer attack

How to fend off a quantum computer attack 2024-10-25 at 07:03 By Help Net Security In this Help Net Security video, IEEE member Marc Lijour explains quantum computing and offers insight into how to fend off a quantum computer attack. The post How to fend off a quantum computer attack appeared first on Help Net

React to this headline:

Loading spinner

How to fend off a quantum computer attack Read More »

Facing the uncertainty of cyber insurance claims

Facing the uncertainty of cyber insurance claims 2024-10-24 at 06:35 By Help Net Security Cyber insurance is vital for companies mitigating cyber risks, but the industry still encounters significant challenges, including shifting policy requirements and uncertainty around coverage in the event of an incident. As cyberattacks continue to cause problems for organizations worldwide, it’s essential

React to this headline:

Loading spinner

Facing the uncertainty of cyber insurance claims Read More »

Evolving cloud threats: Insights and recommendations

Evolving cloud threats: Insights and recommendations 2024-10-23 at 07:03 By Help Net Security Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by leveraging adversary-in-the-middle (AITM) attacks to bypass multi-factor authentication (MFA). This often leads to business email compromise (BEC), which

React to this headline:

Loading spinner

Evolving cloud threats: Insights and recommendations Read More »

Evolving cybercriminal tactics targeting SMBs

Evolving cybercriminal tactics targeting SMBs 2024-10-21 at 07:01 By Help Net Security A recent Todyl report revealed a 558% increase in BEC (Business Email Compromise), AiTM (Adversary-in-the-Middle), and ATO (Account Takeover) attacks in 2024. In this Help Net Security video, David Langlands, Chief Security Officer at Todyl, discusses these evolving cyber threats. Here are the

React to this headline:

Loading spinner

Evolving cybercriminal tactics targeting SMBs Read More »

Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime’s constant rise is becoming everyone’s problem 2024-10-18 at 06:31 By Help Net Security Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced, forcing organizations to constantly adapt their defenses. The rise of deepfake technology, especially in creating realistic audio impersonations, poses new dangers.

React to this headline:

Loading spinner

Cybercrime’s constant rise is becoming everyone’s problem Read More »

AI data collection under fire

AI data collection under fire 2024-10-17 at 06:32 By Help Net Security A recent Cohesity report found that consumers are highly concerned about the information companies collect from them – especially when it`s used for artificial intelligence – with consumers prepared to punish companies by switching providers for any loss of trust. In this Help

React to this headline:

Loading spinner

AI data collection under fire Read More »

The dark side of API security

The dark side of API security 2024-10-15 at 07:02 By Help Net Security APIs are the backbone of digital transformation efforts, connecting applications across organizations, so their security is of the utmost importance. In this Help Net Security video, Lori MacVittie, a Distinguished Engineer at F5, discusses the current state of API security. A recent

React to this headline:

Loading spinner

The dark side of API security Read More »

DORA regulation’s nuts and bolts

DORA regulation’s nuts and bolts 2024-10-11 at 08:02 By Help Net Security The frequency, sophistication, and impact of cyber-attacks on financial institutions have been rising. Given the economic system’s interconnected nature, disruptions in one institution can have cascading effects on the broader financial market, leading to systemic risks. Regulators have responded with increasingly stringent requirements.

React to this headline:

Loading spinner

DORA regulation’s nuts and bolts Read More »

What lies ahead for AI in cybersecurity

What lies ahead for AI in cybersecurity 2024-10-10 at 06:01 By Help Net Security AI is becoming recognized for its potential to strengthen cybersecurity measures and tackle the skills gap across various sectors. Its ability to streamline data management processes boosts efficiency and strengthens security protocols. However, the rise of GenAI has raised alarms about

React to this headline:

Loading spinner

What lies ahead for AI in cybersecurity Read More »

Ransomware activity shows no signs of slowing down

Ransomware activity shows no signs of slowing down 2024-10-03 at 06:01 By Help Net Security Ransomware attacks have seen a significant resurgence, disrupting multiple sectors and affecting global supply chains. Despite efforts to disrupt major ransomware groups, incidents continue to rise, signaling an ongoing and growing threat into 2024. In this Help Net Security round-up,

React to this headline:

Loading spinner

Ransomware activity shows no signs of slowing down Read More »

What bots mean for businesses and consumers

What bots mean for businesses and consumers 2024-10-02 at 06:31 By Help Net Security Simple bots have existed since the early to mid-2000s when organizations had no means to protect themselves or their website’s users from them. Yet today, despite having tools to protect against these simple bots, two in three organizations have made no

React to this headline:

Loading spinner

What bots mean for businesses and consumers Read More »

Open source maintainers: Key to software health and security

Open source maintainers: Key to software health and security 2024-09-30 at 07:01 By Help Net Security Open source has become the foundation of modern application development, with up to 98% of applications incorporating open-source components and open-source code accounting for 70% or more of the typical application. In this Help Net Security video, Donald Fischer,

React to this headline:

Loading spinner

Open source maintainers: Key to software health and security Read More »

Rethinking privacy: A tech expert’s perspective

Rethinking privacy: A tech expert’s perspective 2024-09-26 at 06:33 By Help Net Security Data privacy has become one of the most pressing challenges of our time, but it didn’t happen overnight. The proliferation of data collection, coupled with the rise of advanced technologies like artificial intelligence and machine learning, has made it easier to piece

React to this headline:

Loading spinner

Rethinking privacy: A tech expert’s perspective Read More »

How digital wallets work, and best practices to use them safely

How digital wallets work, and best practices to use them safely 2024-09-19 at 07:31 By Help Net Security With the adoption of digital wallets and the increasing embedding of consumer digital payments into daily life, ensuring security measures is essential. According to a McKinsey report, digital payments are now mainstream and continually evolving, bringing advancements

React to this headline:

Loading spinner

How digital wallets work, and best practices to use them safely Read More »

Scroll to Top