Cybersecurity best practices while working in the summer

IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy Ventura, Director, Security Strategy & Field CISO at ThreatX, discusses how emp… Continue reading Cybersecurity best practices while working in the summer

How ransomware impacts the healthcare industry

Healthcare continues to be one of the most attractive targets for cyberattackers, and the number of breaches affecting the industry is increasing yearly. In this Help Net Security video, Steve Gwizdala, VP of Healthcare at ForgeRock, discusses how vigi… Continue reading How ransomware impacts the healthcare industry

IT leaders believe hybrid cloud solutions are the future of IT

IT leaders are losing sleep over improving overall IT performance (60%), data security (50%), process risk and compliance (46%), and the need to improve agility (41%), according to Rocket Software. To overcome these challenges, IT organizations are tur… Continue reading IT leaders believe hybrid cloud solutions are the future of IT

The rise in cyber extortion attacks and its impact on business security

In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions. A recent report revealed that cyber extortion activity reached the highest volu… Continue reading The rise in cyber extortion attacks and its impact on business security

Preparing health systems for cyber risks and insurance coverage

Our healthcare systems are at risk of infiltration by threat actors, potentially disrupting services, compromising sensitive data, and even jeopardizing patient outcomes. Among the people addressing these challenges is Dennis Fridrich, VP of Cybersecur… Continue reading Preparing health systems for cyber risks and insurance coverage

The magic formula for big data companies to outshine the competition

In today’s data-driven world, organizations that can harness the power of big data and derive actionable insights are positioned to succeed. However, the sheer number of big data companies vying for attention has made it crucial for entrepreneurs to di… Continue reading The magic formula for big data companies to outshine the competition

Exploring the persistent threat of cyberattacks on healthcare

In this Help Net Security interview, Brett Harris, Cybersecurity Officer for the Americas at Siemens Healthineers, discusses the long-term impacts of cyberattacks on healthcare institutions and what healthcare providers can do to protect patients&#8217… Continue reading Exploring the persistent threat of cyberattacks on healthcare

How hardening Microsoft 365 tenants mitigates potential cloud attacks

Moving critical data and workloads to the cloud has significantly changed information security teams. But most don’t have the resources to be successful in their cloud attack modeling—not to mention the deployment of measurable controls to defend again… Continue reading How hardening Microsoft 365 tenants mitigates potential cloud attacks

5 free online cybersecurity courses you should check out

Cryptography In this course, you’ll learn how to protect information to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will develop a basic understanding of cryptographic concepts and how to apply them, implement se… Continue reading 5 free online cybersecurity courses you should check out