authentication
![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/13161306/authentication-biometrics-400x200.jpg)
Breaking down the state of authentication
In this Help Net Security video, Bassam Al-Khalidi, co-CEO of Axiad, discusses the results of Axiad’s recent State of Authentication Survey. Key findings from the survey …
![Vedran Cindric](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/15113322/vedran_cindric-2-treblle-400x200.jpg)
Cybersecurity challenges emerge in the wake of API expansion
In this Help Net Security interview, Vedran Cindric, CEO at Treblle, discusses the exponential growth of AI-related APIs, citing a 96% increase in 2023. He sheds light on the …
![Tiago Rodrigues](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/17124840/tiago_rodrigues-2-wballiance-400x200.jpg)
Wi-Fi 7’s mission-critical role in enterprise, industrial networking
As we transition from Wi-Fi 6 to the more advanced Wi-Fi 7, we uncover the significant enhancements in speed, efficiency, and spectrum usage that set it apart from its …
![servers](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100835/servers-400x200.jpg)
Why you need to extend enterprise IT security to the mainframe
Organizations with mainframes face a unique challenge: extending consistency across the entire enterprise, including mainframe environments. The ongoing issue lies in the …
![account](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/21085008/account-hand-400x200.jpg)
3 main tactics attackers use to bypass MFA
Notable security breaches have bypassed MFA to compromise taxi broker Uber, games company EA, and authentication business Okta, according to SE Labs. CISOs must bolster MFA …
![LATMA](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/08133153/latma-400x200.jpg)
A closer look at LATMA, the open-source lateral movement detection tool
In this Help Net Security video, Gal Sadeh, Head of Data and Security Research at Silverfort, discusses LATMA, a free, open-source tool. It’s engineered with advanced …
![passwords](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/02181830/passwords-1-400x200.jpg)
Many popular websites still cling to password creation policies from 1985
A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute of Technology have found. …
![EU](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100615/EU-lock-400x200.jpg)
eIDAS: EU’s internet reforms will undermine a decade of advances in online security
The European Union’s attempt to reform its electronic identification and trust services – a package of laws better known as eIDAS 2.0 – contains legislation that poses a grave …
![AWS](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/02145128/aws-depth-400x200.jpg)
Short-term AWS access tokens allow attackers to linger for a longer while
Attackers usually gain access to an organization’s cloud assets by leveraging compromised user access tokens obtained via phishing, by using malware, or by finding them …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/22092809/okta2-400x200.jpg)
Okta breach: Hackers stole info on ALL customer support users
The scope of the recent breach of the Okta customer support system is much wider than initially established, the company has admitted on Tuesday: the attackers downloaded a …
![J. Wolfgang Goerlich](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/17115500/j_wolfgang_goerlich-2-cisco-400x200.jpg)
Strategies for cultivating a supportive culture in zero-trust adoption
In this Help Net Security interview, Wolfgang Goerlich, Advisory CISO at Cisco, discusses the benefits of implementing a mature zero-trust model for both security and business …
![Anna Pobletts](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/16125232/anna_pobletts-2-1password-400x200.jpg)
How passkeys are reshaping user security and convenience
In this Help Net Security interview, Anna Pobletts, Head of Passwordless at 1Password, talks about passkey adoption and its acceleration in 2024. This trend is particularly …
Featured news
Resources
Don't miss
- North Korean IT workers are extorting employers, FBI warns
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)