cybersecurity

Healthcare’s alarming cybersecurity reality

Healthcare’s alarming cybersecurity reality 2025-03-28 at 07:35 By Help Net Security 89% of healthcare organizations have the top 1% of riskiest Internet of Medical Things (IoMT) devices – which contain known exploitable vulnerabilities (KEVs) linked to active ransomware campaigns as well as an insecure connection to the internet – on their networks, according to Claroty. […]

React to this headline:

Loading spinner

Healthcare’s alarming cybersecurity reality Read More »

Post-quantum cryptography and the future of online safety

Post-quantum cryptography and the future of online safety 2025-03-28 at 07:04 By Help Net Security In this Help Net Security video, Rebecca Krauthamer, CEO of QuSecure, explores the rising urgency of post-quantum cryptography (PQC) and what organizations must do to prepare. She breaks down the so-called “quantum threat” and explains why it’s not just theoretical.

React to this headline:

Loading spinner

Post-quantum cryptography and the future of online safety Read More »

How to manage and protect your biometric data

How to manage and protect your biometric data 2025-03-27 at 18:08 By Help Net Security Biometric data refers to unique physical or behavioral characteristics that are used to verify a person’s identity. Revoking or changing biometric data is more complicated than changing passwords. Unlike passwords, biometric identifiers like fingerprints or retina scans are unique and

React to this headline:

Loading spinner

How to manage and protect your biometric data Read More »

A closer look at The Ultimate Cybersecurity Careers Guide

A closer look at The Ultimate Cybersecurity Careers Guide 2025-03-27 at 16:48 By Mirko Zorz In this Help Net Security interview, Kim Crawley, cybersecurity expert and Professor at the Open Institute of Technology, discusses her latest book, The Ultimate Cybersecurity Careers Guide. She shares insights on how aspiring professionals can break into the field and

React to this headline:

Loading spinner

A closer look at The Ultimate Cybersecurity Careers Guide Read More »

The hidden costs of security tool bloat and how to fix it

The hidden costs of security tool bloat and how to fix it 2025-03-27 at 08:07 By Mirko Zorz In this Help Net Security interview, Shane Buckley, President and CEO at Gigamon, discusses why combating tool bloat is a top priority for CISOs as they face tighter budgets and expanding security stacks. Buckley shares insights on

React to this headline:

Loading spinner

The hidden costs of security tool bloat and how to fix it Read More »

Cyber insurance isn’t always what it seems

Cyber insurance isn’t always what it seems 2025-03-27 at 07:39 By Mirko Zorz Many companies think cyber insurance will protect them from financial losses after an attack. But many policies have gaps. Some claims get denied. Others cover less than expected. CISOs must understand the risks before an attack happens. Misconceptions about cyber insurance Myth:

React to this headline:

Loading spinner

Cyber insurance isn’t always what it seems Read More »

Hottest cybersecurity open-source tools of the month: March 2025

Hottest cybersecurity open-source tools of the month: March 2025 2025-03-27 at 07:01 By Help Net Security This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Hetty: Open-source HTTP toolkit for security research Hetty is an open-source HTTP toolkit designed for security research, offering a free alternative

React to this headline:

Loading spinner

Hottest cybersecurity open-source tools of the month: March 2025 Read More »

ETSI releases security standard for the quantum future

ETSI releases security standard for the quantum future 2025-03-27 at 06:35 By Help Net Security ETSI launched post-quantum security standard to guarantee the protection of critical data and communications in the future. The specification “Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies” (ETSI TS 104 015) has been developed to enhance security mechanisms, ensuring

React to this headline:

Loading spinner

ETSI releases security standard for the quantum future Read More »

China-linked FamousSparrow APT group resurfaces with enhanced capabilities

China-linked FamousSparrow APT group resurfaces with enhanced capabilities 2025-03-26 at 17:02 By Help Net Security ESET investigated suspicious activity on the network of a trade group in the United States that operates in the financial sector. While helping the affected entity remediate the compromise, they made an unexpected discovery in the victim’s system: malicious tools

React to this headline:

Loading spinner

China-linked FamousSparrow APT group resurfaces with enhanced capabilities Read More »

A CISO’s guide to securing AI models

A CISO’s guide to securing AI models 2025-03-26 at 08:05 By Help Net Security In AI applications, machine learning (ML) models are the core decision-making engines that drive predictions, recommendations, and autonomous actions. Unlike traditional IT applications, which rely on predefined rules and static algorithms, ML models are dynamic—they develop their own internal patterns and

React to this headline:

Loading spinner

A CISO’s guide to securing AI models Read More »

How does your data end up on the dark web?

How does your data end up on the dark web? 2025-03-26 at 07:01 By Help Net Security The dark web is a hidden corner of the internet where people can remain anonymous. It’s often confused with the deep web, but they’re not quite the same thing. The deep web is just everything online that’s not

React to this headline:

Loading spinner

How does your data end up on the dark web? Read More »

Review: The Developer’s Playbook for Large Language Model Security

Review: The Developer’s Playbook for Large Language Model Security 2025-03-25 at 18:06 By Mirko Zorz With the adoption of large language models (LLMs) across industries, security teams often play catch-up. Many organizations are integrating GenAI into customer interactions, software development, and enterprise decision-making, often without grasping the security implications. As LLMs are becoming integral to

React to this headline:

Loading spinner

Review: The Developer’s Playbook for Large Language Model Security Read More »

Microsoft’s new AI agents take on phishing, patching, alert fatigue

Microsoft’s new AI agents take on phishing, patching, alert fatigue 2025-03-25 at 18:06 By Mirko Zorz Microsoft is rolling out a new generation of AI agents in Security Copilot, built to help with some of the most time-consuming security challenges, such as phishing, data protection, and identity management. Phishing is still one of the most

React to this headline:

Loading spinner

Microsoft’s new AI agents take on phishing, patching, alert fatigue Read More »

The vCISO Academy: Transforming MSPs and MSSPs into cybersecurity powerhouses

The vCISO Academy: Transforming MSPs and MSSPs into cybersecurity powerhouses 2025-03-25 at 16:13 By Help Net Security By now, it’s no secret—cyber threats are on the rise, and the need for strong cybersecurity is greater than ever. Globally small and medium-sized businesses (SMBs) are prime targets for cyberattacks, yet many can’t afford a full-time Chief

React to this headline:

Loading spinner

The vCISO Academy: Transforming MSPs and MSSPs into cybersecurity powerhouses Read More »

Spring clean your security data: The case for cybersecurity data hygiene

Spring clean your security data: The case for cybersecurity data hygiene 2025-03-25 at 08:41 By Help Net Security Spring cleaning isn’t just for your closets; security teams should take the same approach to their security operations data, where years of unchecked log growth have created a bloated, inefficient and costly mess. The modern Security Operations

React to this headline:

Loading spinner

Spring clean your security data: The case for cybersecurity data hygiene Read More »

OT systems are strategic targets in global power struggles

OT systems are strategic targets in global power struggles 2025-03-25 at 08:06 By Help Net Security Compared to 2023, 2024 saw a smaller increase in cyberattacks that caused physical consequences on OT organizations, according to Waterfall Security. Nevertheless, there were sharp jumps in the number of sites affected by the hacks, as well as in

React to this headline:

Loading spinner

OT systems are strategic targets in global power struggles Read More »

How AI agents could undermine computing infrastructure security

How AI agents could undermine computing infrastructure security 2025-03-25 at 07:34 By Help Net Security In this Help Net Security video, Ev Kontsevoy, CEO at Teleport, explores the risks AI agents pose to computing infrastructure, particularly when exposed to social engineering attacks. Unlike traditional software, AI agents aren’t fully deterministic, making them more vulnerable to

React to this headline:

Loading spinner

How AI agents could undermine computing infrastructure security Read More »

Protecting your personal information from data brokers

Protecting your personal information from data brokers 2025-03-24 at 18:01 By Help Net Security How aware are you that your personal information could be bought and sold without your consent—and that there are companies whose entire business model revolves around this? So, these companies, called data brokers, collect everything they can about you – where

React to this headline:

Loading spinner

Protecting your personal information from data brokers Read More »

Enterprises walk a tightrope between AI innovation and security

Enterprises walk a tightrope between AI innovation and security 2025-03-24 at 08:02 By Help Net Security AI/ML tool usage surged globally in 2024, with enterprises integrating AI into operations and employees embedding it in daily workflows, according to Zscaler. The report reveals a 3,000+% year-over-year growth in enterprise use of AI/ML tools, highlighting the rapid

React to this headline:

Loading spinner

Enterprises walk a tightrope between AI innovation and security Read More »

Cloud providers aren’t delivering on security promises

Cloud providers aren’t delivering on security promises 2025-03-24 at 07:03 By Help Net Security Security concerns around cloud environments has prompted 44% of CISOs to change cloud service provider, according to Arctic Wolf. This is being driven by the fact that 24% don’t believe their cloud environment is secure, and 43% think cloud service providers

React to this headline:

Loading spinner

Cloud providers aren’t delivering on security promises Read More »

Scroll to Top