Video

Evolving cloud threats: Insights and recommendations

Evolving cloud threats: Insights and recommendations 2024-10-23 at 07:03 By Help Net Security Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by leveraging adversary-in-the-middle (AITM) attacks to bypass multi-factor authentication (MFA). This often leads to business email compromise (BEC), which […]

React to this headline:

Loading spinner

Evolving cloud threats: Insights and recommendations Read More »

Evolving cybercriminal tactics targeting SMBs

Evolving cybercriminal tactics targeting SMBs 2024-10-21 at 07:01 By Help Net Security A recent Todyl report revealed a 558% increase in BEC (Business Email Compromise), AiTM (Adversary-in-the-Middle), and ATO (Account Takeover) attacks in 2024. In this Help Net Security video, David Langlands, Chief Security Officer at Todyl, discusses these evolving cyber threats. Here are the

React to this headline:

Loading spinner

Evolving cybercriminal tactics targeting SMBs Read More »

Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime’s constant rise is becoming everyone’s problem 2024-10-18 at 06:31 By Help Net Security Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced, forcing organizations to constantly adapt their defenses. The rise of deepfake technology, especially in creating realistic audio impersonations, poses new dangers.

React to this headline:

Loading spinner

Cybercrime’s constant rise is becoming everyone’s problem Read More »

AI data collection under fire

AI data collection under fire 2024-10-17 at 06:32 By Help Net Security A recent Cohesity report found that consumers are highly concerned about the information companies collect from them – especially when it`s used for artificial intelligence – with consumers prepared to punish companies by switching providers for any loss of trust. In this Help

React to this headline:

Loading spinner

AI data collection under fire Read More »

The dark side of API security

The dark side of API security 2024-10-15 at 07:02 By Help Net Security APIs are the backbone of digital transformation efforts, connecting applications across organizations, so their security is of the utmost importance. In this Help Net Security video, Lori MacVittie, a Distinguished Engineer at F5, discusses the current state of API security. A recent

React to this headline:

Loading spinner

The dark side of API security Read More »

DORA regulation’s nuts and bolts

DORA regulation’s nuts and bolts 2024-10-11 at 08:02 By Help Net Security The frequency, sophistication, and impact of cyber-attacks on financial institutions have been rising. Given the economic system’s interconnected nature, disruptions in one institution can have cascading effects on the broader financial market, leading to systemic risks. Regulators have responded with increasingly stringent requirements.

React to this headline:

Loading spinner

DORA regulation’s nuts and bolts Read More »

What lies ahead for AI in cybersecurity

What lies ahead for AI in cybersecurity 2024-10-10 at 06:01 By Help Net Security AI is becoming recognized for its potential to strengthen cybersecurity measures and tackle the skills gap across various sectors. Its ability to streamline data management processes boosts efficiency and strengthens security protocols. However, the rise of GenAI has raised alarms about

React to this headline:

Loading spinner

What lies ahead for AI in cybersecurity Read More »

Ransomware activity shows no signs of slowing down

Ransomware activity shows no signs of slowing down 2024-10-03 at 06:01 By Help Net Security Ransomware attacks have seen a significant resurgence, disrupting multiple sectors and affecting global supply chains. Despite efforts to disrupt major ransomware groups, incidents continue to rise, signaling an ongoing and growing threat into 2024. In this Help Net Security round-up,

React to this headline:

Loading spinner

Ransomware activity shows no signs of slowing down Read More »

What bots mean for businesses and consumers

What bots mean for businesses and consumers 2024-10-02 at 06:31 By Help Net Security Simple bots have existed since the early to mid-2000s when organizations had no means to protect themselves or their website’s users from them. Yet today, despite having tools to protect against these simple bots, two in three organizations have made no

React to this headline:

Loading spinner

What bots mean for businesses and consumers Read More »

Open source maintainers: Key to software health and security

Open source maintainers: Key to software health and security 2024-09-30 at 07:01 By Help Net Security Open source has become the foundation of modern application development, with up to 98% of applications incorporating open-source components and open-source code accounting for 70% or more of the typical application. In this Help Net Security video, Donald Fischer,

React to this headline:

Loading spinner

Open source maintainers: Key to software health and security Read More »

Rethinking privacy: A tech expert’s perspective

Rethinking privacy: A tech expert’s perspective 2024-09-26 at 06:33 By Help Net Security Data privacy has become one of the most pressing challenges of our time, but it didn’t happen overnight. The proliferation of data collection, coupled with the rise of advanced technologies like artificial intelligence and machine learning, has made it easier to piece

React to this headline:

Loading spinner

Rethinking privacy: A tech expert’s perspective Read More »

How digital wallets work, and best practices to use them safely

How digital wallets work, and best practices to use them safely 2024-09-19 at 07:31 By Help Net Security With the adoption of digital wallets and the increasing embedding of consumer digital payments into daily life, ensuring security measures is essential. According to a McKinsey report, digital payments are now mainstream and continually evolving, bringing advancements

React to this headline:

Loading spinner

How digital wallets work, and best practices to use them safely Read More »

The ripple effects of regulatory actions on CISO reporting

The ripple effects of regulatory actions on CISO reporting 2024-09-16 at 06:31 By Help Net Security In this Help Net Security video, Sara Behar, Content Manager at YL Ventures, discusses how recent regulatory actions and high-profile legal incidents involving cybersecurity leaders have influenced CISO reporting. In a recent report of the CISO Circuit, YL Ventures

React to this headline:

Loading spinner

The ripple effects of regulatory actions on CISO reporting Read More »

Benefits and best practices of leveraging AI for cybersecurity

Benefits and best practices of leveraging AI for cybersecurity 2024-09-12 at 06:31 By Help Net Security AI has become a key player in protecting valuable organizational insights from threats. Thanks to AI-enabled data protection practices such as behavior monitoring, enterprises no longer have to be reactive to a cyberattack but can be proactive before a

React to this headline:

Loading spinner

Benefits and best practices of leveraging AI for cybersecurity Read More »

Phishing in focus: Disinformation, election and identity fraud

Phishing in focus: Disinformation, election and identity fraud 2024-09-09 at 06:34 By Help Net Security The frequency of phishing attacks is rising as attackers increasingly utilize AI to execute more scams than ever before. In this Help Net Security video, Abhilash Garimella, Head Of Research at Bolster, discusses how phishing scams are now being hosted

React to this headline:

Loading spinner

Phishing in focus: Disinformation, election and identity fraud Read More »

Enterprise DSPM for Fortune 500 – 1touch.io is your go-to solution

Enterprise DSPM for Fortune 500 – 1touch.io is your go-to solution 2024-09-05 at 06:31 By Help Net Security In this Help Net Security video, Jesse Sedler, VP of Product at 1touch.io, provides a compelling overview of the company’s innovative data security posture management solutions. Founded in 2017 by industry veterans, 1touch.io leverages cutting-edge AI to

React to this headline:

Loading spinner

Enterprise DSPM for Fortune 500 – 1touch.io is your go-to solution Read More »

The attack with many names: SMS Toll Fraud

The attack with many names: SMS Toll Fraud 2024-09-03 at 06:31 By Help Net Security Bad actors leverage premium-rate phone numbers and bots to steal billions of dollars from businesses. In this Help Net Security video, Frank Teruel, CFO at Arkose Labs, discusses how to spot and stop them. The post The attack with many

React to this headline:

Loading spinner

The attack with many names: SMS Toll Fraud Read More »

Why ransomware attackers target Active Directory

Why ransomware attackers target Active Directory 2024-08-29 at 07:02 By Help Net Security Ransomware attacks have surged 78% year-over-year, affecting various sectors and organizations and significantly impacting supply chains. In this Help, Net Security video, Craig Birch, Technology Evangelist, and Principal Security Engineer at Cayosoft, discusses the rise of ransomware attacks, why attackers often target

React to this headline:

Loading spinner

Why ransomware attackers target Active Directory Read More »

Rebrand, regroup, ransomware, repeat

Rebrand, regroup, ransomware, repeat 2024-08-26 at 06:01 By Help Net Security Changes witnessed over the last few years have led to larger ransomware groups breaking into smaller units, posing more considerable challenges for law enforcement. Ransomware actors are evading arrest more easily and adapting methods with innovative technologies. In this Help Net Security video, Shobhit

React to this headline:

Loading spinner

Rebrand, regroup, ransomware, repeat Read More »

Food security: Accelerating national protections around critical infrastructure

Food security: Accelerating national protections around critical infrastructure 2024-08-21 at 06:31 By Help Net Security In this Help Net Security video, Mike Lexa, CISO and Global VP of IT Infrastructure and Operations at CNH, discusses how the federal government is taking food security more seriously and what steps must be taken to prioritize security measures.

React to this headline:

Loading spinner

Food security: Accelerating national protections around critical infrastructure Read More »

Scroll to Top