Tag: Features
-
WEF Cybercrime Atlas: Researchers are creating new insights to fight cybercrime
In early 2023, the World Economic Forum (WEF) launched Cybercrime Atlas, with the intent to map the cybercriminal ecosystem by facilitating …
-
Strategies for secure identity management in hybrid environments
In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities …
-
WiCyS: A champion for a more diverse cybersecurity workforce
Lynn Dohm, Executive Director at Women in CyberSecurity (WiCyS), talks about how the organization supports its members across different …
-
Healthcare’s cyber resilience under siege as attacks multiply
In this Help Net Security interview, Eric Demers, CEO of Madaket Health, discusses prevalent cyber threats targeting healthcare …
-
How To Calibrate Your Monitor For Photo Editing
Photoshop and photo editing are a newfangled trend that is becoming everybody’s …
-
Cyber attacks on critical infrastructure show advanced tactics and new capabilities
In this Help Net Security interview, Marty Edwards, Deputy CTO OT/IoT at Tenable, discusses the impact of geopolitical tensions on cyber …
-
Blockchain: Orchid decentralized VPN will affect www
Orchid’s Decentralized VPN (Virtual Private Network) is a new approach to online privacy and security that leverages blockchain technology. …
-
Essential Laptop Gadgets for Gamers
Everyone seems to be looking for the newest, must-have essential gadget or piece of equipment. But what about a …
-
5 Reasons Why You Should Go Cashless Now
Over the years, the idea of having a cashless society is not far-fetched. In fact, due to its efficiency and transfer speed, a lot of …
-
Essential elements of a strong data protection strategy
Instead of starting data protection strategies by planning backups, organizations should flip their mindset and start by planning recovery. …
-
Strengthening critical infrastructure cybersecurity is a balancing act
In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure …
-
Unpatchable vulnerability in Apple chip leaks secret encryption keys
A newly discovered vulnerability baked into Apple’s M-series of chips allows attackers to extract secret keys from Macs when they …
●●●