![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101103/data-400x200.jpg)
The challenges of consumer data and PII usage
In this Help Net Security video, Nong Li, CEO at Okera, talks about the challenges of using and managing consumer data and personally identifiable information (PII). As …
Organizations need to up their cloud native security strategy
Organizations still have a long way to go to understand, plan and deploy their cloud native security strategies, an Aqua Security study reveals. Many cloud native applications …
Most companies don’t have a mature CLM program in place
It’s been more than a year since the SolarWinds attack occurred, but still many organizations are unable to secure and govern the volume of machine and application …
Cyber resiliency is top proactive priority for organizations
In the face of increasing cyberattacks and cyber warfare, organizations are moving toward strengthening their cyber resiliency. An OpenText report provides predictions on what …
![backup](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/25124009/backup-storage-400x200.jpg)
The current state of enterprise backup and recovery
In this video for Help Net Security, Anthony Cusimano, Solutions Evangelist at Veritas, talks about the current state of enterprise backup and recovery. In the wake of the …
Ransomware payments hitting new records in 2021
As cybercriminals increasingly turned to the dark web to pressure victims to pay up by threatening to release sensitive data, ransomware has reached new heights, Palo Alto …
The importance of implementing continuous security in the development lifecycle
A research from Wabbi and IDG found that companies which utilize continuous security have seen a 50% decrease in vulnerabilities. As the number of attacks increase daily, it …
![secure](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111740/secure-400x200.jpg)
Design, prioritize, and implement a cyber defense program with CIS CDM 2.0
The Center for Internet Security (CIS) Community Defense Model (CDM) v2.0 can be used to design, prioritize, implement, and improve an enterprise’s cybersecurity program. …
COVID bounce: A massive 2021 resurgence of cyberthreats
2021 was marked by a massive resurgence of cyberthreats, with a 77% increase in malware detection over 2020, a Malwarebytes’ research revealed. Business-focused …
Many businesses lack a formal ransomware plan
Malware, ransomware and phishing are still the most common threats to organizations, a Thales research reveals. Worryingly, 22% of organizations have paid or would pay a …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101644/money-400x200.jpg)
The Israeli cybersecurity funding landscape in the past year
In this video for Help Net Security, Yonit Wiseman, Associate at YL Ventures, talks about the Israeli cybersecurity funding landscape in the past year. The Israeli …
Number of DDoS attacks in 2021 reached 9.75 million
During the second half of 2021, cybercriminals launched 9.75 million DDoS attacks, a NETSCOUT report has revealed. These attacks show a 3% decrease from the record number set …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege