Deception technology and breach anticipation strategies

Cybersecurity is undergoing a paradigm shift. Previously, defenses were built on the assumption of keeping adversaries out; now, strategies are formed with the idea that they might already be... Read more »

How manufacturers can navigate cybersecurity regulations amid NIST 2.0

The National Institute of Standards and Technology (NIST) released a discussion draft for possible Cybersecurity Framework (CSF) changes earlier this year. The proposed changes aim to help increase the... Read more »

Product showcase: Free email security test by ImmuniWeb Community Edition

According to an FBI report, in 2022, global losses from business email compromise (BEC) and email account compromise (EAC) attacks attained $43 billion, hitting a historic anti-record. Multiple cybersecurity... Read more »

Navigating generative AI risks and regulatory challenges

The mass availability of generative AI, such as OpenAI’s ChatGPT and Google Bard, became a top concern for enterprise risk executives in the second quarter of 2023, according to... Read more »

Building a secure future without traditional passwords

As organizations try to fortify their defenses against an increasingly sophisticated threat landscape, traditional password-based systems reveal their limitations. This is where passwordless authentication steps in – a concept... Read more »

Week in review: 8 free cybersecurity docus, vulnerable Intel Core processors, Black Hat USA 2023

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the future In this Help... Read more »

Black Hat USA 2023 video walkthrough

Help Net Security is in Las Vegas this week for Black Hat USA 2023, and this video provides a closer look at the event. The exhibitors featured in this... Read more »

BigID Access Intelligence Remediation defends users against unauthorized exposure

BigID launched Access Intelligence Remediation, empowering organizations to find and fix access rights violations at scale within their Data Security Posture Management (DSPM) workflows. With this latest innovation, BigID... Read more »

CommScope SYSTIMAX Constellation allows enterprises to build and augment IP networks

CommScope launched SYSTIMAX Constellation edge-based platform for connecting and powering tomorrow’s hyperconnected enterprise. The system combines fault-managed power, hybrid power/data fiber and ceiling-based “Constellation Points” in a star topology... Read more »

How to handle API sprawl and the security threat it poses

The proliferation of APIs has marked them as prime targets for malicious attackers. With recent reports indicating that API vulnerabilities are costing businesses billions of dollars annually, it’s no... Read more »
Subscribe to our Newsletter