cybersecurity

C-suites step up on OT cybersecurity, and it’s paying off

C-suites step up on OT cybersecurity, and it’s paying off 2025-07-10 at 07:44 By Help Net Security There has been a significant increase in the global trend of corporations planning to integrate cybersecurity under the CISO or other executives, according to Fortinet. Growing maturity in OT cybersecurity processes and solutions (Source: Fortinet) OT security moves […]

React to this headline:

Loading spinner

C-suites step up on OT cybersecurity, and it’s paying off Read More »

Global software supply chain visibility remains critically low

Global software supply chain visibility remains critically low 2025-07-10 at 07:44 By Help Net Security Only 23% of organizations are confident that they have very high visibility of their software supply chain, according to LevelBlue’s Data Accelerator. The limited visibility reported by organizations significantly impacts their cyber resilience. Poor risk visibility leaves software supply chains

React to this headline:

Loading spinner

Global software supply chain visibility remains critically low Read More »

Train smarter, respond faster: Close the skill gaps in your SOC

Train smarter, respond faster: Close the skill gaps in your SOC 2025-07-09 at 16:05 By Zeljka Zorz “In today’s fast-paced digital landscape” – as AI chatbots are fond of phrasing it – a cyber attack targeting your organization is a statistical certainty. But is your security team ready to respond when it happens? Can they

React to this headline:

Loading spinner

Train smarter, respond faster: Close the skill gaps in your SOC Read More »

Why your security team feels stuck

Why your security team feels stuck 2025-07-09 at 08:44 By Mirko Zorz Cybersecurity friction usually gets framed as a user problem: password policies that frustrate employees, MFA that slows down logins, or blocked apps that send workers into the arms of shadow IT. But there’s a different kind of friction happening behind the scenes, and

React to this headline:

Loading spinner

Why your security team feels stuck Read More »

It’s time to give AI security its own playbook and the people to run it

It’s time to give AI security its own playbook and the people to run it 2025-07-09 at 08:04 By Mirko Zorz In this Help Net Security interview, Dr. Nicole Nichols, Distinguished Engineer in Machine Learning Security at Palo Alto Networks, discusses why existing security models need to evolve to address the risks of AI agents.

React to this headline:

Loading spinner

It’s time to give AI security its own playbook and the people to run it Read More »

Kanvas: Open-source incident response case management tool

Kanvas: Open-source incident response case management tool 2025-07-09 at 07:31 By Mirko Zorz Kanvas is an open-source incident response case management tool with a simple desktop interface, built in Python. It gives investigators a place to work with SOD (Spreadsheet of Doom) or similar files, so they can handle key tasks without jumping between different

React to this headline:

Loading spinner

Kanvas: Open-source incident response case management tool Read More »

6 eye-opening books on AI’s rise, risks, and realities

6 eye-opening books on AI’s rise, risks, and realities 2025-07-09 at 07:02 By Anamarija Pogorelec AI is changing how we detect, prevent, and respond to cyber threats. From traditional networks to emerging spaces, it is shaping security operations, identity management, and threat response. This collection of AI books offers diverse perspectives, including practical implementations, strategic

React to this headline:

Loading spinner

6 eye-opening books on AI’s rise, risks, and realities Read More »

Exposure management is the answer to: “Am I working on the right things?”

Exposure management is the answer to: “Am I working on the right things?” 2025-07-08 at 09:07 By Mirko Zorz In this Help Net Security interview, Dan DeCloss, Founder and CTO at PlexTrac, discusses the role of exposure management in cybersecurity and how it helps organizations gain visibility into their attack surface to improve risk assessment

React to this headline:

Loading spinner

Exposure management is the answer to: “Am I working on the right things?” Read More »

Cyberattacks are changing the game for major sports events

Cyberattacks are changing the game for major sports events 2025-07-08 at 08:32 By Sinisa Markovic Sports fans and cybercriminals both look forward to major sporting events, but for very different reasons. Fake ticket sites, stolen login details, and DDoS attacks are common ways criminals try to make money or disrupt an event. Why are sports

React to this headline:

Loading spinner

Cyberattacks are changing the game for major sports events Read More »

Can your security stack handle AI that thinks for itself?

Can your security stack handle AI that thinks for itself? 2025-07-08 at 08:03 By Help Net Security In this Help Net Security video, Art Poghosyan, CEO at Britive, explores the rise of agentic AI and its impact on identity security. As autonomous AI agents begin to think, act, and interact more like humans, traditional identity

React to this headline:

Loading spinner

Can your security stack handle AI that thinks for itself? Read More »

CISOs urged to fix API risk before regulation forces their hand

CISOs urged to fix API risk before regulation forces their hand 2025-07-08 at 07:33 By Mirko Zorz Most organizations are exposing sensitive data through APIs without security controls in place, and they may not even realize it, according to Raidiam. Their report, API Security at a Turning Point, draws on a detailed assessment of 68

React to this headline:

Loading spinner

CISOs urged to fix API risk before regulation forces their hand Read More »

AI built it, but can you trust it?

AI built it, but can you trust it? 2025-07-07 at 09:02 By Mirko Zorz In this Help Net Security interview, John Morello, CTO at Minimus, discusses the security risks in AI-driven development, where many dependencies are pulled in quickly. He explains why it’s hard to secure software stacks that no one fully understands. He also

React to this headline:

Loading spinner

AI built it, but can you trust it? Read More »

Review: Attack Surface Management

Review: Attack Surface Management 2025-07-07 at 08:04 By Mirko Zorz Attack Surface Management (ASM) has become one of those buzzwords that gets used a lot but rarely explained in detail. The authors of this book offer a practical guide that aims to change that. About the authors Ron Eddings is the Executive Producer at Hacker

React to this headline:

Loading spinner

Review: Attack Surface Management Read More »

New technique detects tampering or forgery of a PDF document

New technique detects tampering or forgery of a PDF document 2025-07-07 at 07:37 By Sinisa Markovic Researchers from the University of Pretoria presented a new technique for detecting tampering in PDF documents by analyzing the file’s page objects. The technique employs a prototype that can detect changes to a PDF document, such as changes made

React to this headline:

Loading spinner

New technique detects tampering or forgery of a PDF document Read More »

Cloud security maintains its position as top spending priority

Cloud security maintains its position as top spending priority 2025-07-07 at 07:04 By Help Net Security While most enterprises have integrated cloud resources into their operations, many need to improve their ability to secure these environments and the data they contain, according to Thales. Cloud security challenges go beyond technology The variability of controls across

React to this headline:

Loading spinner

Cloud security maintains its position as top spending priority Read More »

NTLM relay attacks are back from the dead

NTLM relay attacks are back from the dead 2025-07-04 at 09:32 By Help Net Security NTLM relay attacks are the easiest way for an attacker to compromise domain-joined hosts. While many security practitioners think NTLM relay is a solved problem, it is not – and, in fact, it may be getting worse. Anecdotally, they are

React to this headline:

Loading spinner

NTLM relay attacks are back from the dead Read More »

New hires, new targets: Why attackers love your onboarding process

New hires, new targets: Why attackers love your onboarding process 2025-07-04 at 09:02 By Help Net Security In this Help Net Security video, Ozan Ucar, CEO of Keepnet Labs, highlights a critical cybersecurity blind spot: the vulnerability of new hires during onboarding. He explains how attackers now use AI-powered, multi-channel phishing tactics to target fresh

React to this headline:

Loading spinner

New hires, new targets: Why attackers love your onboarding process Read More »

Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future

Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future 2025-07-04 at 08:38 By Help Net Security While Africa hosts some of the fastest-growing digital economies globally, it also faces persistent challenges in cybersecurity preparedness. Many organizations and individuals remain unaware of the risks they face online. Phishing schemes and social

React to this headline:

Loading spinner

Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future Read More »

Internet outages are costing companies millions every month

Internet outages are costing companies millions every month 2025-07-04 at 07:32 By Help Net Security To ensure resilience across the internet stack, organizations need to protect and manage four key areas: reachability, availability, reliability, and performance, according to Catchpoint. The negative economic impact of incidents 51% report monthly losses of over $1 million due to

React to this headline:

Loading spinner

Internet outages are costing companies millions every month Read More »

Google open-sources privacy tech for age verification

Google open-sources privacy tech for age verification 2025-07-03 at 18:47 By Sinisa Markovic Age verification is becoming more common across websites and online services. But many current methods require users to share personal data, like a full ID or birthdate, which raises privacy and security concerns. In response, Google has open-sourced a cryptographic solution that

React to this headline:

Loading spinner

Google open-sources privacy tech for age verification Read More »

Scroll to Top