Artificial Intelligence

Making security and development co-owners of DevSecOps

Making security and development co-owners of DevSecOps 2025-07-18 at 09:41 By Mirko Zorz In this Help Net Security interview, Galal Ibrahim Maghola, former Head of Cybersecurity at G42 Company, discusses strategic approaches to implementing DevSecOps at scale. Drawing on experience in regulated industries such as finance, telecom, and critical infrastructure, he offers tips on ownership […]

React to this headline:

Loading spinner

Making security and development co-owners of DevSecOps Read More »

AI adoption is booming but secure scaling not so much

AI adoption is booming but secure scaling not so much 2025-07-18 at 09:35 By Help Net Security 96% of organizations are deploying AI models, and virtually no organization can move into the future without considering how ML and intelligent apps might soon affect its operations, according to F5. Only 2% of global organizations are highly

React to this headline:

Loading spinner

AI adoption is booming but secure scaling not so much Read More »

Google Says AI Agent Thwarted Exploitation of Critical Vulnerability 

Google Says AI Agent Thwarted Exploitation of Critical Vulnerability  2025-07-16 at 14:47 By Eduard Kovacs Google refused to share any details on how its Big Sleep AI foiled efforts to exploit a SQLite vulnerability in the wild. The post Google Says AI Agent Thwarted Exploitation of Critical Vulnerability  appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Google Says AI Agent Thwarted Exploitation of Critical Vulnerability  Read More »

Securing vehicles as they become platforms for code and data

Securing vehicles as they become platforms for code and data 2025-07-15 at 08:31 By Mirko Zorz In this Help Net Security interview, Robert Knoblauch, CISO at Element Fleet Management, discusses how the rise of connected vehicles and digital operations is reshaping fleet management cybersecurity. He points to growing risks like API breaches, tampering with onboard

React to this headline:

Loading spinner

Securing vehicles as they become platforms for code and data Read More »

Google Gemini Tricked Into Showing Phishing Message Hidden in Email 

Google Gemini Tricked Into Showing Phishing Message Hidden in Email  2025-07-14 at 17:04 By Eduard Kovacs Google Gemini for Workspace can be tricked into displaying a phishing message when asked to summarize an email. The post Google Gemini Tricked Into Showing Phishing Message Hidden in Email  appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Google Gemini Tricked Into Showing Phishing Message Hidden in Email  Read More »

Trustwave Launches Managed Phishing for Microsoft Service

Trustwave Launches Managed Phishing for Microsoft Service 2025-07-14 at 16:02 By Phishing remains the number one method attackers use to gain initial access to organizations. That makes your workforce the front line of defense and your ability to identify, neutralize, and respond to phishing attempts is more critical than ever. This article is an excerpt

React to this headline:

Loading spinner

Trustwave Launches Managed Phishing for Microsoft Service Read More »

Legal gaps in AI are a business risk, not just a compliance issue

Legal gaps in AI are a business risk, not just a compliance issue 2025-07-14 at 07:02 By Anamarija Pogorelec A new report from Zendesk outlines a growing problem for companies rolling out AI tools: many aren’t ready to manage the risks. The AI Trust Report 2025 finds that while AI is moving into customer service

React to this headline:

Loading spinner

Legal gaps in AI are a business risk, not just a compliance issue Read More »

Grok-4 Falls to a Jailbreak Two days After Its Release

Grok-4 Falls to a Jailbreak Two days After Its Release 2025-07-12 at 17:57 By Kevin Townsend The latest release of the xAI LLM, Grok-4, has already fallen to a sophisticated jailbreak. The post Grok-4 Falls to a Jailbreak Two days After Its Release appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Grok-4 Falls to a Jailbreak Two days After Its Release Read More »

Behind the code: How developers work in 2025

Behind the code: How developers work in 2025 2025-07-11 at 13:01 By Anamarija Pogorelec How are developers working in 2025? Docker surveyed over 4,500 people to find out, and the answers are a mix of progress and ongoing pain points. AI is gaining ground but still unevenly used. Security is now baked into everyday workflows.

React to this headline:

Loading spinner

Behind the code: How developers work in 2025 Read More »

Employees are quietly bringing AI to work and leaving security behind

Employees are quietly bringing AI to work and leaving security behind 2025-07-11 at 08:06 By Help Net Security While IT departments race to implement AI governance frameworks, many employees have already opened a backdoor for AI, according to ManageEngine. The rise of unauthorized AI use Shadow AI has quietly infiltrated organizations across North America, creating

React to this headline:

Loading spinner

Employees are quietly bringing AI to work and leaving security behind Read More »

What Can Businesses Do About Ethical Dilemmas Posed by AI?

What Can Businesses Do About Ethical Dilemmas Posed by AI? 2025-07-10 at 14:06 By Stu Sjouwerman AI-made decisions are in many ways shaping and governing human lives. Companies have a moral, social, and fiduciary duty to responsibly lead its take-up. The post What Can Businesses Do About Ethical Dilemmas Posed by AI? appeared first on

React to this headline:

Loading spinner

What Can Businesses Do About Ethical Dilemmas Posed by AI? Read More »

Global software supply chain visibility remains critically low

Global software supply chain visibility remains critically low 2025-07-10 at 07:44 By Help Net Security Only 23% of organizations are confident that they have very high visibility of their software supply chain, according to LevelBlue’s Data Accelerator. The limited visibility reported by organizations significantly impacts their cyber resilience. Poor risk visibility leaves software supply chains

React to this headline:

Loading spinner

Global software supply chain visibility remains critically low Read More »

It’s time to give AI security its own playbook and the people to run it

It’s time to give AI security its own playbook and the people to run it 2025-07-09 at 08:04 By Mirko Zorz In this Help Net Security interview, Dr. Nicole Nichols, Distinguished Engineer in Machine Learning Security at Palo Alto Networks, discusses why existing security models need to evolve to address the risks of AI agents.

React to this headline:

Loading spinner

It’s time to give AI security its own playbook and the people to run it Read More »

6 eye-opening books on AI’s rise, risks, and realities

6 eye-opening books on AI’s rise, risks, and realities 2025-07-09 at 07:02 By Anamarija Pogorelec AI is changing how we detect, prevent, and respond to cyber threats. From traditional networks to emerging spaces, it is shaping security operations, identity management, and threat response. This collection of AI books offers diverse perspectives, including practical implementations, strategic

React to this headline:

Loading spinner

6 eye-opening books on AI’s rise, risks, and realities Read More »

Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials

Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials 2025-07-08 at 22:30 By Associated Press impersonator, with a similar incident revealed in May involving President Donald Trump’s chief of staff, Susie Wiles. The misuse of AI to deceive people is likely to grow as the technology improves and becomes more widely available.

React to this headline:

Loading spinner

Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials Read More »

The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore

The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore 2025-07-08 at 18:18 By Kevin Townsend As organizations rush to adopt agentic AI, security leaders must confront the growing risk of invisible threats and new attack vectors. The post The Wild Wild West of Agentic AI – An Attack

React to this headline:

Loading spinner

The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore Read More »

Can your security stack handle AI that thinks for itself?

Can your security stack handle AI that thinks for itself? 2025-07-08 at 08:03 By Help Net Security In this Help Net Security video, Art Poghosyan, CEO at Britive, explores the rise of agentic AI and its impact on identity security. As autonomous AI agents begin to think, act, and interact more like humans, traditional identity

React to this headline:

Loading spinner

Can your security stack handle AI that thinks for itself? Read More »

AI built it, but can you trust it?

AI built it, but can you trust it? 2025-07-07 at 09:02 By Mirko Zorz In this Help Net Security interview, John Morello, CTO at Minimus, discusses the security risks in AI-driven development, where many dependencies are pulled in quickly. He explains why it’s hard to secure software stacks that no one fully understands. He also

React to this headline:

Loading spinner

AI built it, but can you trust it? Read More »

Cloud security maintains its position as top spending priority

Cloud security maintains its position as top spending priority 2025-07-07 at 07:04 By Help Net Security While most enterprises have integrated cloud resources into their operations, many need to improve their ability to secure these environments and the data they contain, according to Thales. Cloud security challenges go beyond technology The variability of controls across

React to this headline:

Loading spinner

Cloud security maintains its position as top spending priority Read More »

Internet outages are costing companies millions every month

Internet outages are costing companies millions every month 2025-07-04 at 07:32 By Help Net Security To ensure resilience across the internet stack, organizations need to protect and manage four key areas: reachability, availability, reliability, and performance, according to Catchpoint. The negative economic impact of incidents 51% report monthly losses of over $1 million due to

React to this headline:

Loading spinner

Internet outages are costing companies millions every month Read More »

Scroll to Top