cybersecurity

Dependency-Check: Open-source Software Composition Analysis (SCA) tool

Dependency-Check: Open-source Software Composition Analysis (SCA) tool 2025-03-19 at 07:47 By Help Net Security Dependency-Check is an open-source Software Composition Analysis (SCA) tool to identify publicly disclosed vulnerabilities within a project’s dependencies. The tool analyzes dependencies for Common Platform Enumeration (CPE) identifiers. When a match is found, the tool generates a report with links to […]

React to this headline:

Loading spinner

Dependency-Check: Open-source Software Composition Analysis (SCA) tool Read More »

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK 2025-03-19 at 07:16 By Help Net Security Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access the encrypted data, which remains secure even in the event of a cloud breach. As

React to this headline:

Loading spinner

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK Read More »

The rise of DAST 2.0 in 2025

The rise of DAST 2.0 in 2025 2025-03-18 at 18:02 By Help Net Security Static Application Security Testing (SAST) found favor among security teams as an easy way to deploy security testing without really engaging developers. With the ability to analyze source code early in the software delivery lifecycle, SAST solutions offered a more proactive

React to this headline:

Loading spinner

The rise of DAST 2.0 in 2025 Read More »

How AI and automation are reshaping security leadership

How AI and automation are reshaping security leadership 2025-03-18 at 16:02 By Help Net Security The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous agentic AI, according to Tines. Additionally, the promise of security automation is coming to fruition. In theory and practice, security

React to this headline:

Loading spinner

How AI and automation are reshaping security leadership Read More »

How financial institutions can minimize their attack surface

How financial institutions can minimize their attack surface 2025-03-18 at 08:01 By Mirko Zorz In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He also shares insights on balancing compliance with agility, lessons from regulatory audits, and Discover’s approach to risk management and workforce development.

React to this headline:

Loading spinner

How financial institutions can minimize their attack surface Read More »

Hackers target AI and crypto as software supply chain risks grow

Hackers target AI and crypto as software supply chain risks grow 2025-03-18 at 07:47 By Help Net Security The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along with malicious campaigns that specifically target AI and cryptocurrency development pipelines, according to a ReversingLabs report. According

React to this headline:

Loading spinner

Hackers target AI and crypto as software supply chain risks grow Read More »

How to encrypt and secure sensitive files on macOS

How to encrypt and secure sensitive files on macOS 2025-03-17 at 18:14 By Anamarija Pogorelec Encrypting files keeps sensitive data like personal details, finances, and passwords safe from attackers by making them unreadable to unauthorized users. Encryption also safeguards data in case of device loss or theft, preventing malicious actors from accessing or misusing the

React to this headline:

Loading spinner

How to encrypt and secure sensitive files on macOS Read More »

Pay, fight, or stall? The dilemma of ransomware negotiations

Pay, fight, or stall? The dilemma of ransomware negotiations 2025-03-17 at 08:02 By Help Net Security Ransomware negotiations are a high-stakes game where every decision matters. In this Help Net Security video, Kurtis Minder, CEO at GroupSense, takes us inside the world of ransomware negotiations. We learn how attackers communicate, the tough decisions victims face,

React to this headline:

Loading spinner

Pay, fight, or stall? The dilemma of ransomware negotiations Read More »

Review: Cybersecurity Tabletop Exercises

Review: Cybersecurity Tabletop Exercises 2025-03-17 at 07:31 By Mirko Zorz Packed with real-world case studies and practical examples, Cybersecurity Tabletop Exercises offers insights into how organizations have successfully leveraged tabletop exercises to identify security gaps and enhance their incident response strategies. The authors explore a range of realistic scenarios, including phishing campaigns, ransomware attacks, and

React to this headline:

Loading spinner

Review: Cybersecurity Tabletop Exercises Read More »

Quantifying cyber risk strategies to resonate with CFOs and boards

Quantifying cyber risk strategies to resonate with CFOs and boards 2025-03-14 at 17:02 By Mirko Zorz In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a more strategic role within their organizations. He explains that aligning cybersecurity

React to this headline:

Loading spinner

Quantifying cyber risk strategies to resonate with CFOs and boards Read More »

Top 5 threats keeping CISOs up at night in 2025

Top 5 threats keeping CISOs up at night in 2025 2025-03-14 at 08:05 By Help Net Security Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing AI-driven security, ransomware resilience, supply chain risk management, insider threat mitigation, and compliance preparedness,

React to this headline:

Loading spinner

Top 5 threats keeping CISOs up at night in 2025 Read More »

CISOs, are your medical devices secure? Attackers are watching closely

CISOs, are your medical devices secure? Attackers are watching closely 2025-03-13 at 08:02 By Mirko Zorz The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has also introduced cybersecurity challenges to safeguard patient safety and uphold organizational security. Securing IoMT: Prioritizing risks

React to this headline:

Loading spinner

CISOs, are your medical devices secure? Attackers are watching closely Read More »

Cybersecurity classics: 10 books that shaped the industry

Cybersecurity classics: 10 books that shaped the industry 2025-03-13 at 07:32 By Help Net Security Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a CISO, a seasoned expert, or cybersecurity enthusiast, these must-reads belong on your shelf. Masters of

React to this headline:

Loading spinner

Cybersecurity classics: 10 books that shaped the industry Read More »

Goodbye passwords? Enterprises ramping up passkey adoption

Goodbye passwords? Enterprises ramping up passkey adoption 2025-03-12 at 18:01 By Help Net Security 87% of companies have, or are in the midst of, rolling out passkeys with goals tied to improved user experience, enhanced security, and compliance, according to the FIDO Alliance. Key findings Enterprises understand the value of passkeys for workforce sign-ins. Most

React to this headline:

Loading spinner

Goodbye passwords? Enterprises ramping up passkey adoption Read More »

Burnout in cybersecurity: How CISOs can protect their teams (and themselves)

Burnout in cybersecurity: How CISOs can protect their teams (and themselves) 2025-03-12 at 07:37 By Mirko Zorz Cybersecurity is a high-stakes, high-pressure field in which CISOs and their teams constantly battle threats, compliance requirements, and business expectations. The demand for 24/7 vigilance, sophisticated attacks, and a shortage of skilled professionals have led to a burnout

React to this headline:

Loading spinner

Burnout in cybersecurity: How CISOs can protect their teams (and themselves) Read More »

Defending against EDR bypass attacks

Defending against EDR bypass attacks 2025-03-12 at 07:06 By Help Net Security EDR bypass and killer attacks are surging, yet many organizations continue to overlook this threat while they have become over-reliant on this security tool – particularly when preventing ransomware. In this Help Net Security video, John Dwyer, Director of Security Research at Binary

React to this headline:

Loading spinner

Defending against EDR bypass attacks Read More »

How to spot and avoid AI-generated scams

How to spot and avoid AI-generated scams 2025-03-11 at 18:02 By Help Net Security As AI technology advances, cybercriminals create more personalized and convincing scams. This includes mimicking voices, deepfake videos, and highly convincing phishing emails that are difficult to spot. Phishing, deepfakes, and voice cloning are among the most common AI-driven techniques used by

React to this headline:

Loading spinner

How to spot and avoid AI-generated scams Read More »

Smart cybersecurity spending and how CISOs can invest where it matters

Smart cybersecurity spending and how CISOs can invest where it matters 2025-03-11 at 08:30 By Mirko Zorz CISOs face mounting pressure to spend wisely on security. Yet, many organizations remain vulnerable due to misplaced priorities and inefficient budgeting. This article explores common pitfalls and offers strategies to strengthen cybersecurity. Recent data highlights a paradox: while

React to this headline:

Loading spinner

Smart cybersecurity spending and how CISOs can invest where it matters Read More »

How remote work strengthens cybersecurity teams

How remote work strengthens cybersecurity teams 2025-03-11 at 07:32 By Anamarija Pogorelec The global transition to remote work has reshaped traditional workplace dynamics, introducing challenges and opportunities for cybersecurity teams. For CISOs and security professionals, embracing a remote workforce can be a strategic advantage, enhancing team capabilities and driving the modernization of security practices. Specialized

React to this headline:

Loading spinner

How remote work strengthens cybersecurity teams Read More »

Scroll to Top