Please turn on your JavaScript for this page to function normally.
medical devices
Shrinking healthcare cybersecurity gaps between hospitals and manufacturers

The relationship between medical device manufacturers (MDMs) and healthcare delivery organizations (HDOs) has always been challenged by a lack of good communication, mostly to …

ransomware
Ransomware works fast, you need to be faster to counter it

Since the pandemic hit and organizations had to quickly adjust to widespread remote work and stand up hybrid environments, ransomware gangs have been having a field day. In …

Threats to hardware security are growing

Hardware attacks are becoming more and more sophisticated. There are several reasons this could be happening: Security increasingly supported in hardware – Mistakes can …

woman
Funding women-led cybersecurity startups: Where are we at?

In 2020, cybersecurity companies raised $8.9 billion globally, and in 2021 the amount jumped (significantly) to over $21 billion. While the data is very exciting and promising …

cloud
Smart government agencies are opting for multicloud environments

In recent years, there had been more cyberattacks, ransomware events, and an ongoing discovery of potential vulnerabilities within an IT infrastructure. In addition, the …

password
Passwords are secrets that should never be shared

A weak password is one of the easiest way for attackers to steal valuable information about a person from their accounts, and then commit crimes with it. The stronger the …

nmap
How to identify vulnerabilities with NMAP

In this video for Help Net Security, Shani Dodge Reiner, Development Team Leader at Vicarius, explains how to identify vulnerabilities using the NMAP tool. NMAP is a very …

person
Self-promotion in cybersecurity: Why you should do it, and how

The cybersecurity market is hot! In 2021 Pinpoint Search Group recorded 300 funding rounds invested into cybersecurity vendors that added up to over $20 billion. 158 of those …

CIS SecureSuite
How to enhance your cyber defense program with CIS SecureSuite

Join this webinar to learn how you can prioritize your security program to meet the requirements of regulatory and compliance frameworks with the CIS Critical Security …

How to keep your passwords safe online

Uswitch.com conducted a consumer survey to find out how the UK chooses their passwords, how safe they are and how often they have been hacked.  Survey highlights include that …

Cloud
Discover your public cloud exposure with Recon.Cloud

In this video for Help Net Security, Gafnit Amiga, Director of Security Research at Lightspin, talks about the firm’s latest tool: Recon.Cloud. Recon.Cloud is a public …

Diversity initiatives needed to set cybersecurity skills shortage right

Fortinet have released a report indicating that the cybersecurity skills shortages continue to challenge organizations, not the least due to security breaches and associated …

Don't miss

Cybersecurity news