10 Ways to Optimize Data Center Operations

Running a data center efficiently is no small feat. From managing energy costs to preventing downtime, there’s a lot that can go wrong—and a lot that can be optimized. Discover 10 actionable strategies to enhance your data center operations, including…

TinyLoader Malware Spreads via Network Shares and Malicious Shortcut Files on Windows

A sophisticated malware operation that combines multiple attack vectors to steal cryptocurrency and deliver additional malicious payloads to Windows systems. A recently discovered TinyLoader malware campaign is actively targeting Windows users through a multi-pronged attack strategy involving network share exploitation,…

Cloudflare Confirms Data Breach – Customer Data Exposed via Salesforce Attack

Cloudflare has disclosed a significant data breach affecting customer information following a sophisticated supply chain attack targeting its Salesforce integration with Salesloft Drift. The incident, which occurred between August 12-17, 2025, resulted in the exposure of customer support case data…

Detecting danger: EASM in the modern security stack

In today’s complex threat environment, the challenge for security professionals isn’t just defeating threats – it’s finding your vulnerabilities in the first place. That’s where External Attack Surface Management (EASM) tools come in. EASM can identify the many weaknesses that…

Five habits of highly secure development teams

In this Help Net Security video, Brendon Collins, Principal Consultant at Optiv, explores how organizations can embed security and privacy into the software development lifecycle (SDLC) from the very start. He outlines five proactive principles, including default-deny architecture, privacy in…

Grade School Crypto Videos

This is a short, gentle two-part introduction to basic cryptographic concepts using text-based crypto examples. The videos illustrate encryption, decryption, ciphers, keys, algorithms, code cracking, cryptanalysis, and letter frequency analysis.  Full disclosure: I produced these videos over a decade ago.…

Secrets Management that Fits Your Budget

Is Comprehensive Protection for Your Digital Assets Achievable on a Budget? One aspect that often goes overlooked is the management of Non-Human Identities (NHIs) and secrets. NHI and secrets management, with its focus on the lifecycle of machine identities and…

Stay Ahead with Proactive Secrets Security

Why Is Proactive Secrets Security Paramount in Today’s Business Landscape? With cybersecurity threats continuously evolving and becoming more sophisticated, companies are faced with the complex task of managing Non-Human Identities (NHIs) and their secrets. But what are NHIs, and how…

Innovator Spotlight: Skyhawk Security

Cloud Security’s New Frontier: How Generative AI is Transforming Threat Detection The cybersecurity landscape is shifting beneath our feet. Traditional perimeter defenses are crumbling, and cloud environments have become increasingly… The post Innovator Spotlight: Skyhawk Security appeared first on Cyber…