![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105149/idea-400x200.jpg)
Enhance security while lowering IT overhead in times of recession
“Is cybersecurity recession-proof?” That’s the question on the minds of many security professionals and executives as a possible economic downturn of indeterminate length and …
![ChatGPT](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/16102048/chatgpt-hand2-400x200.jpg)
Why you should treat ChatGPT like any other vendor service
Although OpenAI is an established organization with many years of experience promoting and developing AI systems, the relative immaturity of the ChatGPT application, combined …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094128/phishing-400x200.jpg)
How two-step phishing attacks evade detection and what you can do about it
Phishing attacks have become increasingly prevalent and sophisticated, making it more difficult for individuals to protect themselves from these scams. In this Help Net …
![Silicon Valley Bank](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/12131952/svb-silicon_valley_bank-scam-400x200.jpg)
The SVB demise is a fraudster’s paradise, so take precautions
For those who haven’t followed the drama, Silicon Valley Bank has been shut down by the California Department of Financial Protection and Innovation, after a bank run that …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
The cybersecurity landscape in the era of economic instability
Economic uncertainty is squeezing organizations globally. Gartner predicts nearly half of cybersecurity leaders will change jobs by 2025. These findings are alarming but …
![document signing](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/06191437/document_signing-400x200.jpg)
What CISOs need to understand about document signing
In this Help Net Security video, David King, Director of Innovation at GlobalSign, discusses document signing. Digital signatures utilize advanced cryptographic technology to …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100701/chess-400x200.jpeg)
Three crucial moments when founding a cybersecurity startup
With 10% of startups failing in the first year, making wise and future-proof decisions for your new cybersecurity venture is essential. Building the perfect cybersecurity …
![college](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093500/college-400x200.jpg)
How STEM education can solve talent shortages, improve cybersecurity
In this Help Net Security video, Avani Desai, CEO at Schellman, talks about how teaching STEM subjects like cybersecurity is essential for addressing the staffing crisis and …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093232/shield1-400x200.jpg)
How to achieve and shore up cyber resilience in a recession
Today’s business leaders are grappling with two opposing challenges. On the one hand, present day global economic and recessionary pressures mean spending policies need to be …
![transfer.sh](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/02131615/transfersh-400x200.jpg)
Attackers increasingly using transfer.sh to host malicious code
For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/02112403/vault-pattern-400x200.jpg)
Uncovering the most pressing cybersecurity concerns for SMBs
In this Help Net Security video interview, James Edgar, CISO at Fleetcor, discusses what consequences SMBs are most concerned about when it comes to cyberattacks, what …
![DNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/01123207/dns-400x200.jpg)
DNS abuse: Advice for incident responders
What DNS abuse techniques are employed by cyber adversaries and which organizations can help incident responders and security teams detect, mitigate and prevent them? The DNS …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege