Features
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093404/money-400x200.jpg)
More organizations are paying the ransom. Why?
Most organizations (71%) have been hit by ransomware in 2021, and most of those (63%) opted for paying the requested ransom, the 2022 Cyberthreat Defense Report (CDR) by the …
![Brent Johnson](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/31100728/brent_johnson_2-bluefin-400x200.jpg)
Prioritizing cybersecurity training during the onboarding process
In this interview with Help Net Security, Brent Johnson, CISO at Bluefin, talks about the importance of making cybersecurity training a priority for every organization and why …
![James Turgal](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/31102828/james_turgal_2-optiv-400x200.jpg)
Hybrid threat model: Watch out for the unhappy employee
In this interview with Help Net Security, James Turgal, VP of Cyber Risk, Strategy and Board Relations at Optiv Security, talks about the hybrid threat model, a new approach …
![Zur Ulianitzky](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/30092419/zur_ulianitzky_2-xm_cyber-400x200.jpg)
New and less known cybersecurity risks you should be aware of
In this interview with Help Net Security, Zur Ulianitzky, Head of Security Research at XM CYber, gives insights on new and less talked about cybersecurity risks organizations …
![Vitaliy Lim](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/04120840/vitaliy_lim-2-feroot-400x200.jpg)
JavaScript security: The importance of prioritizing the client side
In this interview with Help Net Security, Vitaliy Lim, CTO at Feroot, talks about the most common JavaScript threats, the devastating impact of malicious or vulnerable code, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/25143709/max_shuftan_2-sans-400x200.jpg)
How to recruit cybersecurity talent from atypical backgrounds
In this interview with Help Net Security, Max Shuftan, Director of Mission Programs & Partnerships at SANS Institute, talks about how companies and the cybersecurity …
![Den Jones](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/15153256/den_jones_2-banyan_security-400x200.jpg)
How to become a passwordless organization
In this interview with Help Net Security, Den Jones, CSO at Banyan Security, explains the benefits of implementing passwordless authentication and the process every …
![Stephen Carter](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/14123801/stephen_carter_2-nucleus-400x200.jpg)
Why a modern vulnerability management strategy requires state-of-the-art solutions
In this interview with Help Net Security, Stephen Carter, CEO at Nucleus Security, explains the importance of having a vulnerability management strategy within an …
![Michael Johnson](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/11105131/michael_johnson_2-safe-400x200.jpg)
The massive impact of vulnerabilities in critical infrastructure
In this interview with Help Net Security, Michael Johnson, Board of Directors at Safe Security, talks about the importance of critical infrastructure security, why attacks on …
![Bronwyn Boyle](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/14082345/bronwyn_boyle_2-mambu-1-400x200.jpg)
Women in cybersecurity: How far have they come?
In this interview with Help Net Security, Bronwyn Boyle, CISO at Mambu, talks about women in cybersecurity, what are the hurdles they must overcome in their career, and how …
![Alissa Knight](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/01101152/alissa_knight_2-knightink-400x200.jpg)
SDP solutions are true ZTNA solutions: They trust no one
In this interview with Help Net Security, Alissa Knight, cybersecurity influencer and partner at Knight Ink, explains why organizations should switch to SDP as opposed to VPN, …
![Dropbox](https://img.helpnetsecurity.com/wp-content/uploads/2021/07/20154929/dropbox-files-400x200.jpg)
How do I select a CDR soluton for my business?
In the process of file sharing, what is essential for every organization is to make sure malware doesn’t tag along, and this is where a content disarm and reconstruction …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege