Please turn on your JavaScript for this page to function normally.
money
Minimizing risk: Key cybersecurity-related M&A considerations

Global M&A hit new highs in 2021 reaching an eye-popping $5.1 trillion in total deal value, according to PwC. With economic headwinds leaving acquisition as the only …

question
Building trust into every aspect of an organization

In this Help Net Security video, Matthew Chiodi, Chief Trust Officer at Cerby, talks about building trust not just when it comes to applications and data, but also with …

Keyboard
Lack of staff and resources drives smaller teams to outsource security

Companies with small security teams continue to face a number of distinctive challenges that place these organizations at greater risk than larger enterprises, according to …

fraud detection
How to identify and combat online fraud

As the popularity of Buy Now, Pay Later (BNPL) grows, organizations and consumers must remain vigilant or risk becoming a victim of fraud, as account takeover attacks – where …

tunnel
How organizations can implement a complete data strategy

In this Help Net Security video, Bernard Brantley, CISO at Corelight, discusses why organizations need to rethink their data strategy, challenging the assumption that they …

Managing the Dynamic Nature of Cyber Security
Introducing the book: Managing the Dynamic Nature of Cyber Security

In order to provide organizations with knowledge to lower their cyber risk, Dr. Sander Zeijlemaker, launched his book – “Managing the Dynamic Nature of Cyber Security: A …

money
AppViewX raises $20 million to help businesses reduce risk

AppViewX has raised $20 million in a Series B funding round, led by growth equity firm and existing investor, Brighton Park Capital. Through its Automation Platform, AppViewX …

Metasploit
The past, present and future of Metasploit

Metasploit is the most used penetration testing framework. In this Help Net Security video, Spencer McIntyre, Lead Security Researcher at Rapid7, talks about how Metasploit …

Support
Why SBOMs aren’t the silver bullet they’re portrayed as

A Software Bill of Materials, often shortened to the acronym SBOM, is a formal, machine-readable inventory of software components and dependencies, information about those …

cybersecurity investments
Huntress acquires security awareness training platform Curricula for $22 million

Huntress, the managed security platform for SMBs, has acquired Curricula, a story-based security awareness training platform that empowers employees to better defend …

law enforcement
Cybercriminals targeting law enforcement agencies worldwide

Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 500 companies worldwide, has registered an increase in malicious activity targeting law enforcement …

tools
How adversaries are leveraging pentesting tools to launch attacks

In this Help Net Security video, Tony Lambert, Senior Malware Analyst at Red Canary, talks about how adversaries’ favorite tools are legitimate tools that are used for …

Don't miss

Cybersecurity news