Please turn on your JavaScript for this page to function normally.
architecture
Most mid-sized businesses lack cybersecurity experts, incident response plans

99% of all businesses across the United States and Canada are mid-sized businesses facing cybersecurity challenges, according to a Huntress report. Aimed to gain insights into …

healthcare
How healthcare CISOs can automate cloud security controls

Cloud environments provide many benefits, primarily involving their ease of scalability and resilience. Those qualities exist because of automation and the easy and …

ChatGPT
How ChatGPT is changing the cybersecurity game

The cybersecurity industry can leverage GPT-3 potential as a co-pilot to help defeat attackers, according to Sophos. The latest report details projects developed by Sophos …

traffic
Tracking the global spread of malware

Approximately 10-16 percent of organizations have shown evidence of malicious command and control (C2) activities, strongly indicating a network breach within the last year, …

identity theft
Cyber attribution: Vigilance or distraction?

Cyber attribution is a process by which security analysts collect evidence, build timelines and attempt to piece together evidence in the wake of a cyberattack to identify the …

phishing
How two-step phishing attacks evade detection and what you can do about it

Phishing attacks have become increasingly prevalent and sophisticated, making it more difficult for individuals to protect themselves from these scams. In this Help Net …

ChatGPT
The rise of AI threats: Is your business prepared to face ChatGPT?

Skyhigh Security has seen firsthand how 33,000 enterprise users have accessed ChatGPT through corporate infrastructures. Almost 7 TB of data has been transacted with ChatGPT …

world
The cybersecurity landscape in the era of economic instability

Economic uncertainty is squeezing organizations globally. Gartner predicts nearly half of cybersecurity leaders will change jobs by 2025. These findings are alarming but …

document signing
What CISOs need to understand about document signing

In this Help Net Security video, David King, Director of Innovation at GlobalSign, discusses document signing. Digital signatures utilize advanced cryptographic technology to …

chess
Three crucial moments when founding a cybersecurity startup

With 10% of startups failing in the first year, making wise and future-proof decisions for your new cybersecurity venture is essential. Building the perfect cybersecurity …

college
How STEM education can solve talent shortages, improve cybersecurity

In this Help Net Security video, Avani Desai, CEO at Schellman, talks about how teaching STEM subjects like cybersecurity is essential for addressing the staffing crisis and …

shield
How to achieve and shore up cyber resilience in a recession

Today’s business leaders are grappling with two opposing challenges. On the one hand, present day global economic and recessionary pressures mean spending policies need to be …

Don't miss

Cybersecurity news