49% of organizations around the world had to deal with fake or modified physical identity documents in 2022, as Regula’s survey revealed. With this fraud always on the rise,... Read more »
While mobile users are increasingly falling victims of cybercriminals, organizations are raising their spending in mobile endpoint detection and response solutions (Mobile EDR). To tackle these new cybersecurity threats,... Read more »
Databricks has entered into a definitive agreement to acquire MosaicML, a generative AI platform. Together, Databricks and MosaicML will make generative AI accessible for every organization, enabling them to... Read more »
The compromise of PBI Research and The Berwyn Group’s MOVEit installation has resulted in the theft of data belonging to several pension systems and insurance companies – and millions... Read more »
In this Help Net Security interview, Brett Harris, Cybersecurity Officer for the Americas at Siemens Healthineers, discusses the long-term impacts of cyberattacks on healthcare institutions and what healthcare providers... Read more »
Moving critical data and workloads to the cloud has significantly changed information security teams. But most don’t have the resources to be successful in their cloud attack modeling—not to... Read more »
Cryptography In this course, you’ll learn how to protect information to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will develop a basic understanding of cryptographic concepts and how... Read more »
Attackers typically find exposed “secrets” – pieces of sensitive information that allow access to an enterprise cloud environment — in as little as two minutes and, in many cases,... Read more »
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unraveling the multifaceted threats facing telecom companies In this Help Net Security interview, Georgia... Read more »
Wallarm announced its API Abuse Prevention feature to address one of the most critical API threats: bot-based attacks. Wallarm can now accurately identify and mitigate API bot activity, protecting... Read more »
