cybersecurity

Review: The Developer’s Playbook for Large Language Model Security

Review: The Developer’s Playbook for Large Language Model Security 2025-03-25 at 18:06 By Mirko Zorz With the adoption of large language models (LLMs) across industries, security teams often play catch-up. Many organizations are integrating GenAI into customer interactions, software development, and enterprise decision-making, often without grasping the security implications. As LLMs are becoming integral to […]

React to this headline:

Loading spinner

Review: The Developer’s Playbook for Large Language Model Security Read More »

Microsoft’s new AI agents take on phishing, patching, alert fatigue

Microsoft’s new AI agents take on phishing, patching, alert fatigue 2025-03-25 at 18:06 By Mirko Zorz Microsoft is rolling out a new generation of AI agents in Security Copilot, built to help with some of the most time-consuming security challenges, such as phishing, data protection, and identity management. Phishing is still one of the most

React to this headline:

Loading spinner

Microsoft’s new AI agents take on phishing, patching, alert fatigue Read More »

The vCISO Academy: Transforming MSPs and MSSPs into cybersecurity powerhouses

The vCISO Academy: Transforming MSPs and MSSPs into cybersecurity powerhouses 2025-03-25 at 16:13 By Help Net Security By now, it’s no secret—cyber threats are on the rise, and the need for strong cybersecurity is greater than ever. Globally small and medium-sized businesses (SMBs) are prime targets for cyberattacks, yet many can’t afford a full-time Chief

React to this headline:

Loading spinner

The vCISO Academy: Transforming MSPs and MSSPs into cybersecurity powerhouses Read More »

Spring clean your security data: The case for cybersecurity data hygiene

Spring clean your security data: The case for cybersecurity data hygiene 2025-03-25 at 08:41 By Help Net Security Spring cleaning isn’t just for your closets; security teams should take the same approach to their security operations data, where years of unchecked log growth have created a bloated, inefficient and costly mess. The modern Security Operations

React to this headline:

Loading spinner

Spring clean your security data: The case for cybersecurity data hygiene Read More »

OT systems are strategic targets in global power struggles

OT systems are strategic targets in global power struggles 2025-03-25 at 08:06 By Help Net Security Compared to 2023, 2024 saw a smaller increase in cyberattacks that caused physical consequences on OT organizations, according to Waterfall Security. Nevertheless, there were sharp jumps in the number of sites affected by the hacks, as well as in

React to this headline:

Loading spinner

OT systems are strategic targets in global power struggles Read More »

How AI agents could undermine computing infrastructure security

How AI agents could undermine computing infrastructure security 2025-03-25 at 07:34 By Help Net Security In this Help Net Security video, Ev Kontsevoy, CEO at Teleport, explores the risks AI agents pose to computing infrastructure, particularly when exposed to social engineering attacks. Unlike traditional software, AI agents aren’t fully deterministic, making them more vulnerable to

React to this headline:

Loading spinner

How AI agents could undermine computing infrastructure security Read More »

Protecting your personal information from data brokers

Protecting your personal information from data brokers 2025-03-24 at 18:01 By Help Net Security How aware are you that your personal information could be bought and sold without your consent—and that there are companies whose entire business model revolves around this? So, these companies, called data brokers, collect everything they can about you – where

React to this headline:

Loading spinner

Protecting your personal information from data brokers Read More »

Enterprises walk a tightrope between AI innovation and security

Enterprises walk a tightrope between AI innovation and security 2025-03-24 at 08:02 By Help Net Security AI/ML tool usage surged globally in 2024, with enterprises integrating AI into operations and employees embedding it in daily workflows, according to Zscaler. The report reveals a 3,000+% year-over-year growth in enterprise use of AI/ML tools, highlighting the rapid

React to this headline:

Loading spinner

Enterprises walk a tightrope between AI innovation and security Read More »

Cloud providers aren’t delivering on security promises

Cloud providers aren’t delivering on security promises 2025-03-24 at 07:03 By Help Net Security Security concerns around cloud environments has prompted 44% of CISOs to change cloud service provider, according to Arctic Wolf. This is being driven by the fact that 24% don’t believe their cloud environment is secure, and 43% think cloud service providers

React to this headline:

Loading spinner

Cloud providers aren’t delivering on security promises Read More »

53% of security teams lack continuous and up-to-date visibility

53% of security teams lack continuous and up-to-date visibility 2025-03-21 at 18:03 By Help Net Security Enterprises lack visibility into their own data, creating security risks that are compounding as organizations and their employees increase AI adoption, according to Bedrock Security. The majority of organizations struggle to track sensitive information across sprawling cloud environments, leaving

React to this headline:

Loading spinner

53% of security teams lack continuous and up-to-date visibility Read More »

The hidden risk in SaaS: Why companies need a digital identity exit strategy

The hidden risk in SaaS: Why companies need a digital identity exit strategy 2025-03-21 at 08:31 By Help Net Security In the face of sudden trade restrictions, sanctions, or policy shifts, relying on SaaS providers outside your region for identity services is a gamble that companies can no longer afford to take. With trade disputes

React to this headline:

Loading spinner

The hidden risk in SaaS: Why companies need a digital identity exit strategy Read More »

AI will make ransomware even more dangerous

AI will make ransomware even more dangerous 2025-03-21 at 08:07 By Help Net Security Ransomware is the top predicted threat for 2025, which is especially concerning given 38% of security professionals say ransomware will become even more dangerous when powered by AI, according to Ivanti. In comparison to the threat level, only 29% of security

React to this headline:

Loading spinner

AI will make ransomware even more dangerous Read More »

5 pitfalls that can delay cyber incident response and recovery

5 pitfalls that can delay cyber incident response and recovery 2025-03-20 at 08:35 By Help Net Security The responsibility of cyber incident response falls squarely on the shoulders of the CISO. And many CISOs invest heavily in technical response procedures, tabletop exercises and theoretical plans only to find out that when an actual breach strikes

React to this headline:

Loading spinner

5 pitfalls that can delay cyber incident response and recovery Read More »

How healthcare CISOs can balance security and accessibility without compromising care

How healthcare CISOs can balance security and accessibility without compromising care 2025-03-20 at 08:35 By Mirko Zorz In this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare data and what organizations can do to stay ahead. He shares insights on vendor management, zero trust, and

React to this headline:

Loading spinner

How healthcare CISOs can balance security and accessibility without compromising care Read More »

Chinese military-linked companies dominate US digital supply chain

Chinese military-linked companies dominate US digital supply chain 2025-03-20 at 07:35 By Help Net Security Despite growing national security concerns and government restrictions, Chinese military-linked companies remain deeply embedded in the US digital supply chain, according to Bitsight. These organizations, many of which have been designated by the US Department of Defense as “Chinese Military

React to this headline:

Loading spinner

Chinese military-linked companies dominate US digital supply chain Read More »

70% of leaked secrets remain active two years later

70% of leaked secrets remain active two years later 2025-03-20 at 07:01 By Help Net Security Long-lived plaintext credentials have been involved in most breaches over the last several years, according to GitGuardian. When valid credentials, such as API keys, passwords, and authentication tokens, leak, attackers at any skill level can gain initial access or

React to this headline:

Loading spinner

70% of leaked secrets remain active two years later Read More »

Most organizations change policies to reduce CISO liability risk

Most organizations change policies to reduce CISO liability risk 2025-03-19 at 18:15 By Help Net Security 93% of organizations made policy changes over the preceding 12 months to address concerns about increased personal liability for CISOs, according to Fastly. This includes two in five organizations (41%) increasing CISO participation in strategic decisions at the board

React to this headline:

Loading spinner

Most organizations change policies to reduce CISO liability risk Read More »

Moving beyond checkbox security for true resilience

Moving beyond checkbox security for true resilience 2025-03-19 at 08:13 By Mirko Zorz In this Help Net Security interview, William Booth, director, ATT&CK Evaluations at MITRE, discusses how CISOs can integrate regulatory compliance with proactive risk management, prioritize spending based on threat-informed assessments, and address overlooked vulnerabilities like shadow IT and software supply chain risks.

React to this headline:

Loading spinner

Moving beyond checkbox security for true resilience Read More »

Dependency-Check: Open-source Software Composition Analysis (SCA) tool

Dependency-Check: Open-source Software Composition Analysis (SCA) tool 2025-03-19 at 07:47 By Help Net Security Dependency-Check is an open-source Software Composition Analysis (SCA) tool to identify publicly disclosed vulnerabilities within a project’s dependencies. The tool analyzes dependencies for Common Platform Enumeration (CPE) identifiers. When a match is found, the tool generates a report with links to

React to this headline:

Loading spinner

Dependency-Check: Open-source Software Composition Analysis (SCA) tool Read More »

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK 2025-03-19 at 07:16 By Help Net Security Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access the encrypted data, which remains secure even in the event of a cloud breach. As

React to this headline:

Loading spinner

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK Read More »

Scroll to Top