9 essential ransomware guides and checklists available for free

According to Fortinet, ransomware activity has intensified, registering an increase of 13 times compared to the beginning of 2023 in terms of all malware detections. The rise of Ransomware-as-a-Service has primarily driven this surge in ransomware vari… Continue reading 9 essential ransomware guides and checklists available for free

How should organizations navigate the risks and opportunities of AI?

As we realize exciting new advancements in the application of generative pre-trained transformer (GPT) technology, our adversaries are finding ingenious ways to leverage these capabilities to inflict harm. There’s evidence to suggest that offensive act… Continue reading How should organizations navigate the risks and opportunities of AI?

The pitfalls of neglecting security ownership at the design stage

For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of inputs that go beyond the IT and network access aspects. In this Help Net Security int… Continue reading The pitfalls of neglecting security ownership at the design stage

Cloud service inefficiencies drain IT budgets

71% of IT professionals stated that cloud-related costs make up 30% or more of their total IT spend, according to Aptum. In the current demanding economic environment, organizations are becoming increasingly aware of the financial implications of their… Continue reading Cloud service inefficiencies drain IT budgets

Are developers giving enough thought to prompt injection threats when building code?

With National Coding Week behind us, the development community has had its annual moment of collective reflection and focus on emerging technologies that are shaping the industry. Among these, large language models (LLMs) and “generative AI” have becom… Continue reading Are developers giving enough thought to prompt injection threats when building code?

Why more security doesn’t mean more effective compliance

Financial institutions have always been a valuable target for cyberattacks. That’s partly why banking and financial institutions are heavily regulated and have more compliance requirements than those in most other industries. A slew of new rules have b… Continue reading Why more security doesn’t mean more effective compliance

How companies can take control of their cybersecurity

In this Help Net Security interview, Baya Lonqueux, CEO at Reciproc-IT, discusses the evolving cybersecurity landscape and the essential skillsets needed for teams working in this field. The interview highlights the shift from technical expertise to a … Continue reading How companies can take control of their cybersecurity

Building GenAI competence for business growth

To embark on the GenAI technology adoption journey for business success, organizations require foundational activities related to GenAI investment, guidance in prioritizing use cases, and identification of key stakeholders essential for building and im… Continue reading Building GenAI competence for business growth

18 free Microsoft Azure cybersecurity resources you should check out

Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the way for the future. Whether you’re looking to build, run, or manage appl… Continue reading 18 free Microsoft Azure cybersecurity resources you should check out

Avoiding domain security risks when taking your business online

Unfortunately, as available domain extensions increase in variety (and uniqueness), so do security risks. In this Help Net Security video, Prudence Malinki, Head of Industry Relations at Markmonitor, discusses best practices enterprises should abide by… Continue reading Avoiding domain security risks when taking your business online