
Rookout’s Snapshots: The fourth pillar of observability for more secure applications
Liran Haimovitch, CTO and co-founder of Rookout, with his extensive background in cybersecurity within the Israeli government, has a unique perspective on the importance of …

Best practices to secure digital identities
With cybersecurity incidents involving compromised credentials continually the most common cause of a data breach for enterprises – and account takeover for individuals, …

How two-step phishing attacks evade detection and what you can do about it
Phishing attacks have become increasingly prevalent and sophisticated, making it more difficult for individuals to protect themselves from these scams. In this Help Net …

Three crucial moments when founding a cybersecurity startup
With 10% of startups failing in the first year, making wise and future-proof decisions for your new cybersecurity venture is essential. Building the perfect cybersecurity …

How STEM education can solve talent shortages, improve cybersecurity
In this Help Net Security video, Avani Desai, CEO at Schellman, talks about how teaching STEM subjects like cybersecurity is essential for addressing the staffing crisis and …

Expert strategies for defending against multilingual email-based attacks
BEC (Business Email Compromise) attacks have become increasingly prevalent in recent years, with cybercriminals using a variety of tactics to gain access to sensitive …

The top security threats to GraphQL APIs and how to address them
Enterprises looking to modernize their APIs are increasingly switching from the REST architecture to the open-source data query and manipulation language GraphQL. While the …

Mounting cybersecurity pressure is creating headaches in railway boardrooms
The expansion of potential cyber threats has increased due to the integration of connected devices, the Internet of Things (IoT), and the convergence of IT and OT in railway …

The loneliness of leading a cybersecurity startup
Linor spends her days working with cybersecurity founders at her Venture Capital firm. Gaining insight into their experiences over the course of building these relationships …

Why encrypting emails isn’t as simple as it sounds
The quality of protected communications matters – a lot. If the sent material is highly sensitive and the legislation and/or policy demands high security, opportunistic …

How can businesses decrease cyber insurance premiums while maintaining coverage?
In 2022, significant geopolitical developments have led to equally significant changes within the cyber insurance market. In this Help Net Security video, Chris Denbigh-White, …

Preventing a ransomware attack with intelligence: Strategies for CISOs
Bad news first: Ransomware isn’t going anywhere. The good news? The right intelligence can help organizations dramatically reduce risk surrounding a cyber extortion event. In …