cybersecurity

Bankers Association’s attack on cybersecurity transparency

Bankers Association’s attack on cybersecurity transparency 2025-06-03 at 08:04 By Help Net Security A coalition of banking industry associations, including SIFA, the American Bankers Association (ABA), Bank Policy Institute (BPI), and several other lobbying groups have made a disgraceful appeal to the SEC to eliminate the rule requiring public disclosure of material cybersecurity incidents within […]

React to this headline:

Loading spinner

Bankers Association’s attack on cybersecurity transparency Read More »

Development vs. security: The friction threatening your code

Development vs. security: The friction threatening your code 2025-06-03 at 07:32 By Sinisa Markovic Developers are driven to deliver new features quickly, while security teams prioritize risk mitigation, which often puts the two at odds. 61% of developers said that it’s critical that security doesn’t block or decelerate the development process or become a barrier

React to this headline:

Loading spinner

Development vs. security: The friction threatening your code Read More »

CISO 3.0: Leading AI governance and security in the boardroom

CISO 3.0: Leading AI governance and security in the boardroom 2025-06-02 at 08:50 By Mirko Zorz In this Help Net Security interview, Aaron McCray, Field CISO at CDW, discusses how AI is transforming the CISO role from a tactical cybersecurity guardian into a strategic enterprise risk advisor. With AI now embedded across business functions, CISOs

React to this headline:

Loading spinner

CISO 3.0: Leading AI governance and security in the boardroom Read More »

Why privacy in blockchain must start with open source

Why privacy in blockchain must start with open source 2025-05-30 at 09:02 By Help Net Security Traditionally, trust came from centralized institutions. Banks, payment networks, and clearinghouses are closed systems. Users cannot see the inner workings, but they rely on external audits, government regulation, and long histories of compliance to feel secure. It’s a model

React to this headline:

Loading spinner

Why privacy in blockchain must start with open source Read More »

AI agents have access to key data across the enterprise

AI agents have access to key data across the enterprise 2025-05-30 at 08:14 By Help Net Security 82% of organizations already use AI agents, but only 44% of organizations report having policies in place to secure them, according to SailPoint. While 53% are in the process of developing such policies, the reality is that most

React to this headline:

Loading spinner

AI agents have access to key data across the enterprise Read More »

What CISOs can learn from the frontlines of fintech cybersecurity

What CISOs can learn from the frontlines of fintech cybersecurity 2025-05-29 at 09:03 By Mirko Zorz At Span Cyber Security Arena, I sat down with Ria Shetty, Director, Cyber Security & Resilience for Europe at Mastercard. Our conversation cut through the hype and focused on what CISOs deal with every day: how to embed security

React to this headline:

Loading spinner

What CISOs can learn from the frontlines of fintech cybersecurity Read More »

How CISOs can regain ground in the AI fraud war

How CISOs can regain ground in the AI fraud war 2025-05-29 at 08:31 By Help Net Security Fraudsters are winning the AI arms race, first-party fraud is rising, and siloed systems are holding back defenses, according to DataVisor. Their 2025 Fraud & AML Executive Report, based on surveys of banks, fintechs, credit unions, and digital

React to this headline:

Loading spinner

How CISOs can regain ground in the AI fraud war Read More »

CISOs prioritize AI-driven automation to optimize cybersecurity spending

CISOs prioritize AI-driven automation to optimize cybersecurity spending 2025-05-29 at 08:04 By Help Net Security Cybersecurity leaders and consultants identified AI-driven automation and cost optimization as top organizational priorities, according to Wipro. 30% of respondents are investing in AI automation to enhance their cybersecurity operations. AI-driven automation can help in detecting and responding to threats

React to this headline:

Loading spinner

CISOs prioritize AI-driven automation to optimize cybersecurity spending Read More »

How to threat hunt Living Off The Land binaries

How to threat hunt Living Off The Land binaries 2025-05-29 at 07:32 By Help Net Security In this Help Net Security video, Lee Archinal, Senior Threat Hunter at Intel 471, walks through practical strategies for detecting malicious activity involving Living Off The Land binaries (LOLBins). These are legitimate tools built into operating systems, such as

React to this headline:

Loading spinner

How to threat hunt Living Off The Land binaries Read More »

Review: Cybersecurity For Dummies, 3rd Edition

Review: Cybersecurity For Dummies, 3rd Edition 2025-05-29 at 07:01 By Mirko Zorz If you’re new to cybersecurity and looking for a book that doesn’t overwhelm you with jargon or dive too deep into technical territory, Cybersecurity For Dummies might be a solid starting point. It’s written with beginners in mind and assumes you know how

React to this headline:

Loading spinner

Review: Cybersecurity For Dummies, 3rd Edition Read More »

Why data provenance must anchor every CISO’s AI governance strategy

Why data provenance must anchor every CISO’s AI governance strategy 2025-05-28 at 08:30 By Help Net Security Across the enterprise, artificial intelligence has crept into core functions – not through massive digital transformation programs, but through quiet, incremental adoption. Legal departments are summarizing contracts. HR is rewording sensitive employee communications. Compliance teams are experimenting with

React to this headline:

Loading spinner

Why data provenance must anchor every CISO’s AI governance strategy Read More »

Hottest cybersecurity open-source tools of the month: May 2025

Hottest cybersecurity open-source tools of the month: May 2025 2025-05-28 at 07:03 By Help Net Security This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Vuls: Open-source agentless vulnerability scanner Vuls is an open-source tool that helps users find and manage security vulnerabilities. It was created

React to this headline:

Loading spinner

Hottest cybersecurity open-source tools of the month: May 2025 Read More »

Why app modernization can leave you less secure

Why app modernization can leave you less secure 2025-05-27 at 09:09 By Help Net Security Enterprises typically “modernize” access patterns for an application by enabling industry standard protocols like OIDC or SAML to provide single sign-on (SSO) for legacy apps via a cloud identity provider (IDP). That’s a major step towards better user experience, improved

React to this headline:

Loading spinner

Why app modernization can leave you less secure Read More »

How AI agents reshape industrial automation and risk management

How AI agents reshape industrial automation and risk management 2025-05-27 at 08:33 By Mirko Zorz In this Help Net Security interview, Michael Metzler, Vice President Horizontal Management Cybersecurity for Digital Industries at Siemens, discusses the cybersecurity implications of deploying AI agents in industrial environments. He talks about the risks that come with AI agents making

React to this headline:

Loading spinner

How AI agents reshape industrial automation and risk management Read More »

How well do you know your remote IT worker?

How well do you know your remote IT worker? 2025-05-27 at 08:06 By Sinisa Markovic Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into companies around the world, gaining access to sensitive data. Recently, more of these schemes have been linked to North Korea.

React to this headline:

Loading spinner

How well do you know your remote IT worker? Read More »

4.5% of breaches now extend to fourth parties

4.5% of breaches now extend to fourth parties 2025-05-27 at 07:32 By Help Net Security Security teams can no longer afford to treat third-party security as a compliance checkbox, according to SecurityScorecard. Traditional vendor risk assessments, conducted annually or quarterly, are too slow to detect active threats. 35.5% of all breaches in 2024 were third-party

React to this headline:

Loading spinner

4.5% of breaches now extend to fourth parties Read More »

Why layoffs increase cybersecurity risks

Why layoffs increase cybersecurity risks 2025-05-26 at 08:32 By Sinisa Markovic A wave of layoffs has swept through the tech industry, leaving IT teams in a rush to revoke all access those employees may have had. Additionally, 54% of tech hiring managers say their companies are likely to conduct layoffs within the next year, and

React to this headline:

Loading spinner

Why layoffs increase cybersecurity risks Read More »

Cyber threats are changing and here’s what you should watch for

Cyber threats are changing and here’s what you should watch for 2025-05-26 at 07:33 By Help Net Security In this Help Net Security video, Stefan Tanase, Cyber Intelligence Expert at CSIS, gives an overview of how cybercriminals are changing their tactics, including using legitimate tools to avoid detection and developing more advanced info-stealing malware. Tanase

React to this headline:

Loading spinner

Cyber threats are changing and here’s what you should watch for Read More »

AI forces security leaders to rethink hybrid cloud strategies

AI forces security leaders to rethink hybrid cloud strategies 2025-05-26 at 07:01 By Help Net Security Hybrid cloud infrastructure is under mounting strain from the growing influence of AI, according to Gigamon. Cyberthreats grow in scale and sophistication As cyberthreats increase in both scale and sophistication, breach rates have surged to 55% during the past

React to this headline:

Loading spinner

AI forces security leaders to rethink hybrid cloud strategies Read More »

Is privacy becoming a luxury? A candid look at consumer data use

Is privacy becoming a luxury? A candid look at consumer data use 2025-05-23 at 09:02 By Mirko Zorz In this Help Net Security interview, Dr. Joy Wu, Assistant Professor, UBC Sauder School of Business, discusses the psychological and societal impacts of data monetization, why current privacy disclosures often fall short, and what it will take

React to this headline:

Loading spinner

Is privacy becoming a luxury? A candid look at consumer data use Read More »

Scroll to Top