![person](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101915/person-400x200.jpg)
CISOs gear up to combat the rising threat of B2B fraud
The ongoing banking and economic turmoil has opened the floodgates to fraudsters. In this Help Net Security video, ex-British Intelligence officer Alex Beavan, Head of Ethics …
![SASE](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14135733/sase-hns-400x200.jpg)
Converging networking and security with SASE
While technology advancements and distributed workforces have created efficiencies and flexibility for companies, they’ve also created overcomplexity, which can increase …
![chain](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/13152653/chain1-400x200.jpg)
Strengthening the weakest links in the digital supply chain
In this Help Net Security video, Marc Gaffan, CEO at IONIX, discusses how businesses’ biggest cybersecurity mistake is not protecting the full external attack surface …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203445/data_analytics1-400x200.jpg)
A fresh look at the current state of financial fraud
In this Help Net Security video, Greg Woolf, CEO at FiVerity, discusses how the emergence of sophisticated fraud tools powered by AI and recent upheavals in the banking sector …
![Arthur Hu](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/17110906/arthur_hu-2-lenovo-400x200.jpg)
Using AI/ML to optimize your tech stack and enhance business efficiency
In this Help Net Security interview, Arthur Hu, SVP, Global CIO and Services & Solutions Group CTO at Lenovo, discusses how AI/ML is optimizing tech stacks, the hurdles …
![What to do (and what not to do) after a data breach](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11133014/what-to-do-data-breach-400x200.jpg)
What to do (and what not to do) after a data breach
Data breaches have been hitting the headlines left and right. Every time a breach occurs, the impacted organization’s response differs from the last. In this Help Net Security …
![Charles Brooks](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/04105921/charles_brooks-2-georgetown_university_school_of_continuing_studies-400x200.jpg)
CISOs under pressure: Protecting sensitive information in the age of high employee turnover
In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks …
![quantum computing](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07084938/quantum_computing1-400x200.jpg)
Real-world examples of quantum-based attacks
Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from …
![working on holiday](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28142654/laptop-holiday-400x200.jpg)
Cybersecurity best practices while working in the summer
IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
How ransomware impacts the healthcare industry
Healthcare continues to be one of the most attractive targets for cyberattackers, and the number of breaches affecting the industry is increasing yearly. In this Help Net …
![extortion](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/22092644/extortion-400x200.jpg)
The rise in cyber extortion attacks and its impact on business security
In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions. A …
![micropatches](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/21112414/micropatches-400x200.jpg)
Micropatches: What they are and how they work
In this Help Net Security video, Mitja Kolsek, CEO at Acros Security, discusses micropatches, a solution to a huge security problem. With micropatches, there are no reboots or …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege