
Nearly all consumers are backing up their computers, but data loss is here to stay
65.1 percent of consumers or their family member lost data as a result of an accidental deletion, hardware failure or software problem – a jump of 29.4 percentage points from …

How to build an effective vulnerability management program
The concept of vulnerability management has undergone a number of changes in the last few years. It is no longer simply a synonym for vulnerability assessment, but has grown …

Cybercriminals are increasingly using encryption to conceal and launch attacks
In this Help Net Security podcast, Deepen Desai, VP Security Research & Operations at Zscaler, talks about the latest Zscaler Cloud Security Insight Report, which focuses …

Secure workloads without slowing down your DevOps flows
In this Help Net Security podcast recorded at RSA Conference 2019, David Meltzer, CTO at Tripwire, and Lamar Bailey, Senior Director of Security Research at Tripwire, discuss …

Employee cybersecurity essentials part 1: Passwords and phishing
Your company may have state-of-the-art monitoring and the latest anti-malware and anti-virus programs, but that doesn’t mean you’re not at risk for a breach, or that – as an …

Breaking the cybersecurity stalemate by investing in people
No surprise, it happened again. In 2018, the financial toll cyber breaches took on organizations hit $3.86 million, a 6.4 percent rise from 2017. Before last year’s close, …

A network is only as strong as its weakest shard
Blockchain, a nascent technology, has enterprises globally enamored with the promise it holds to fundamentally turn everything from how we interact, transact, store, and …

The art of securing ERP applications: Protecting your critical business processes
In this Help Net Security podcast recorded at RSA Conference 2019, Juan Pablo Perez-Etchegoyen, CTO at Onapsis talks about the challenges of securing and monitoring ERP …

Four key security tips when using any collaboration technology
With database breaches and ransomware attacks making daily news, security is now a top priority for companies, and collaboration solutions are no exception. In the current age …

Tax season scaries: How to keep your data safe from insider threats
With April 15 quickly approaching, companies across the country are rushing to get their taxes filed. This often requires third party specialists who are well-versed in …

Current phishing defense strategies and execution are not hitting the mark
Few professionals are completely confident in their ability to assess the effectiveness of their phishing awareness efforts. In a new paper, Phishing Defense and Governance, …

Network performance requirements grow in the era of 5G: Are your security processes ready?
The new generation of 5G cellular networks are beginning to be rolled out in leading countries like the U.S., bringing to life the promise of connecting everything from …
Featured news
Resources
Don't miss
- Cybersecurity and the development of software-defined vehicles
- Ransomware is up, zero-days are booming, and your IP camera might be next
- AI in the SOC: Game-changer or more noise?
- CISOs say they’re prepared, their data says otherwise
- Millions of Dell laptops could be persistently backdoored in ReVault attacks