Please turn on your JavaScript for this page to function normally.
AI
92% of enterprises unprepared for AI security challenges

Most industries continue to run almost two or more months behind in patching software vulnerabilities, endpoints remain vulnerable to threats, and most enterprise PCs must be …

smartphone
Enterprises face significant losses from mobile fraud

A recent Enea survey highlights a worrying trend in enterprise security: Following ChatGPT’s launch, 76% of businesses are inadequately protected against rising …

bad bots
Bots dominate internet activity, account for nearly half of all traffic

49.6% of all internet traffic came from bots in 2023, a 2% increase over the previous year, and the highest level Imperva has reported since it began monitoring automated …

attack
Understanding next-level cyber threats

In this Help Net Security video, Trevor Hilligoss, VP of SpyCloud Labs, discusses the 2024 SpyCloud Identity Exposure Report, an annual report examining the latest trends in …

compliance
IT and security professionals demand more workplace flexibility

The concept of Everywhere Work is now much broader, encompassing where, when, and how professionals get their work done — and flexibility has become a key workplace priority, …

free red teaming resources
5 free red teaming resources to get you started

Red teaming is evaluating the effectiveness of your cybersecurity by eliminating defender bias and adopting an adversarial perspective within your organization. Tactics may …

audio deepfakes
Audio deepfakes: What they are, and the risks they present

Audio deepfakes are becoming a big problem. Recent cybercriminal campaigns use voice cloning technology to replicate the speech tone and patterns of celebrities such as Elon …

CISO
31% of women in tech consider switching roles over the next year

31% of women in tech are considering leaving their organization over the next 12 months due foremost to poor management, followed by a lack of training and a desire for better …

Why CISSP
eBook: Why CISSP?

As new cyber threats emerge daily in our connected world, there’s never been a greater urgency for cybersecurity professionals than now. What can CISSP certification do for …

surveillance
How to protect IP surveillance cameras from Wi-Fi jamming

Gone are the days of criminals cutting camera wires to evade detection: with the proliferation of affordable internet-connected cameras, burglars must resort to Wi-Fi jamming. …

cloud security
Exposing the top cloud security threats

Many companies consider AI-powered threats to be the top cloud security threat to their business. Concerningly, less than half are confident in their ability to tackle those …

Zarf
Zarf: Open-source continuous software delivery on disconnected networks

Zarf is a free, open-source tool that enables continuous software delivery on disconnected networks. It currently offers fully automated support for K3s, K3d, and Kind and is …

Don't miss

Cybersecurity news