10 essential cybersecurity cheat sheets available for free
Cheat sheets are concise, to-the-point references tailored for instant insights. This article provides a curated list of 10 essential cybersecurity cheat sheets, all free to …
How to go from collecting risk data to actually reducing risk?
Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: they need to move beyond finding risks to effectively …
15 free Microsoft 365 security training modules worth your time
Microsoft 365 is a cloud-based productivity suite. Beyond just tools like Word and Excel, it integrates productivity applications with cloud functionalities, device …
9 essential ransomware guides and checklists available for free
According to Fortinet, ransomware activity has intensified, registering an increase of 13 times compared to the beginning of 2023 in terms of all malware detections. The rise …
Why more security doesn’t mean more effective compliance
Financial institutions have always been a valuable target for cyberattacks. That’s partly why banking and financial institutions are heavily regulated and have more compliance …
18 free Microsoft Azure cybersecurity resources you should check out
Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the …
The hidden dangers of low-value data
In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to …
Access control in cloud-native applications in multi-location environments (NIST SP 800-207)
NIST released Special Publication (SP) 800-207A – “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location …
The critical role of authorization in safeguarding financial institutions
According to a recent Cost of Data Breach report, the financial industry has the second highest average cost for a data breach, making the value well worth financial …
How should SMBs navigate the phishing minefield?
In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on how to minimize the threat phishing presents to …
17 free AWS cybersecurity courses you can take right now
Amazon Web Services (AWS) is the most extensive and widely-used cloud platform in the world, providing more than 200 services through global data centers. It serves millions …
Empowering consumer privacy with network security
Every online interaction hinges on the bedrock of network security. With cyber threats and data breaches making headlines daily, businesses must understand how network …
Featured news
Sponsored
Don't miss
- Kali Linux 2024.3 released: 11 new tools, Qualcomm Snapdragon SDM845 SoC support
- Ivanti fixes critical vulnerabilities in Endpoint Management (CVE-2024-29847)
- Cybersecurity is a fundamental component of patient care and safety
- DockerSpy: Search for images on Docker Hub, extract sensitive information
- How AI and zero trust are transforming resilience strategies