cybersecurity

Political campaigns struggle to balance AI personalization and voter privacy

Political campaigns struggle to balance AI personalization and voter privacy 2025-02-10 at 07:05 By Mirko Zorz In this Help Net Security interview, Mateusz Łabuz, researcher at the IFSH, discusses the balance between using AI for personalized political campaigns and protecting voter privacy. Łabuz also discusses the potential of AI in fact-checking, the regulatory landscape, and […]

React to this headline:

Loading spinner

Political campaigns struggle to balance AI personalization and voter privacy Read More »

Evolving uses of tokenization to protect data

Evolving uses of tokenization to protect data 2025-02-10 at 06:04 By Help Net Security Tokenization replaces sensitive data, such as credit card numbers or personal identifiers, with unique, non-sensitive tokens with no exploitable value. This method helps protect sensitive information by ensuring that the actual data is never stored or transmitted, reducing the risk of

React to this headline:

Loading spinner

Evolving uses of tokenization to protect data Read More »

Self-sovereign identity could transform fraud prevention, but…

Self-sovereign identity could transform fraud prevention, but… 2025-02-07 at 10:03 By Help Net Security The way we manage digital identity is fundamentally broken. The root of the problem lies in traditional, centralized identity models, where a single organization holds and controls a user’s credentials, creating an attractive target for attackers. The bigger the database, the

React to this headline:

Loading spinner

Self-sovereign identity could transform fraud prevention, but… Read More »

Infosec pros struggle under growing compliance

Infosec pros struggle under growing compliance 2025-02-07 at 07:07 By Help Net Security The implementation of new regulatory measures that impact the UK, EU, and beyond are driving organizations to enhance vigilance in addressing evolving cybersecurity and operational risks, according to AuditBoard. The research showed 91% of respondents report feeling concerned about cybersecurity threats to

React to this headline:

Loading spinner

Infosec pros struggle under growing compliance Read More »

The overlooked risks of poor data hygiene in AI-driven organizations

The overlooked risks of poor data hygiene in AI-driven organizations 2025-02-06 at 07:03 By Mirko Zorz In this Help Net Security interview, Oliver Friedrichs, CEO at Pangea, discusses why strong data hygiene is more important than ever as companies integrate AI into their operations. With AI-driven applications handling sensitive enterprise data, poor access controls and

React to this headline:

Loading spinner

The overlooked risks of poor data hygiene in AI-driven organizations Read More »

Enterprises invest heavily in AI-powered solutions

Enterprises invest heavily in AI-powered solutions 2025-02-06 at 06:38 By Help Net Security AI is driving significant changes in attack sources, with 88% of enterprises observing an increase in AI-powered bot attacks in the last two years, according to Arkose Labs. 53% said they have lost between $10 million to over $500 million during the

React to this headline:

Loading spinner

Enterprises invest heavily in AI-powered solutions Read More »

How to customize Safari for private browsing on iOS

How to customize Safari for private browsing on iOS 2025-02-06 at 06:04 By Help Net Security Apple’s Safari browser includes several features aimed at enhancing privacy while browsing the web. Two of the most notable privacy features are Intelligent Tracking Prevention (ITP) and Private Browsing mode. Intelligent Tracking Prevention (ITP) Intelligent Tracking Prevention (ITP) is

React to this headline:

Loading spinner

How to customize Safari for private browsing on iOS Read More »

The API security crisis and why businesses are at risk

The API security crisis and why businesses are at risk 2025-02-05 at 06:30 By Help Net Security In this Help Net Security video, Ivan Novikov, CEO of Wallarm, discusses the 2025 API ThreatStats Report, highlighting how APIs have become the primary attack surface over the past year, mainly driven by the rise of AI-related risks.

React to this headline:

Loading spinner

The API security crisis and why businesses are at risk Read More »

More destructive cyberattacks target financial institutions

More destructive cyberattacks target financial institutions 2025-02-05 at 06:06 By Help Net Security Financial institutions will continue to be the ultimate targets for criminals and threat actors, as a successful attack offers a significant payoff, according to Contrast Security. Contrast Security has surveyed 35 of the world’s leading financial institutions to better understand their cyber

React to this headline:

Loading spinner

More destructive cyberattacks target financial institutions Read More »

Aim for crypto-agility, prepare for the long haul

Aim for crypto-agility, prepare for the long haul 2025-02-04 at 07:33 By Help Net Security While organizations have long experimented with various facets of digital transformation, the journey toward crypto-agility is one of the most significant technological transitions of our time. Success in the emerging quantum era will require technical expertise, strategic foresight, careful planning,

React to this headline:

Loading spinner

Aim for crypto-agility, prepare for the long haul Read More »

What you can do to prevent workforce fraud

What you can do to prevent workforce fraud 2025-02-04 at 07:19 By Mirko Zorz In this Help Net Security interview, Benjamin Racenberg, Senior Intelligence Services Manager at Nisos, discusses the threat of workforce fraud, particularly DPRK-affiliated IT workers infiltrating remote roles. With HR teams and recruiters often unprepared to detect these sophisticated schemes, businesses face

React to this headline:

Loading spinner

What you can do to prevent workforce fraud Read More »

8 steps to secure GenAI integration in financial services

8 steps to secure GenAI integration in financial services 2025-02-04 at 07:00 By Help Net Security GenAI offers financial services institutions enormous opportunities, particularly in unstructured dataset analysis and management, but may also increase security risks, according to FS-ISAC. GenAI can organize oceans of information and retrieve insights from it that you can use to

React to this headline:

Loading spinner

8 steps to secure GenAI integration in financial services Read More »

The hidden dangers of a toxic cybersecurity workplace

The hidden dangers of a toxic cybersecurity workplace 2025-02-03 at 07:35 By Mirko Zorz In this Help Net Security interview, Rob Lee, Chief of Research and Head of Faculty at SANS Institute, discusses what a toxic environment looks like and how professionals can recognize red flags such as high turnover, burnout, and a pervasive fear

React to this headline:

Loading spinner

The hidden dangers of a toxic cybersecurity workplace Read More »

Only 3% of organizations have a dedicated budget for SaaS security

Only 3% of organizations have a dedicated budget for SaaS security 2025-02-03 at 06:48 By Help Net Security Mid-market organizations are grappling with managing the large volume of SaaS applications, both sanctioned and unsanctioned, with actual numbers often exceeding expectations, according to Cloud Security Alliance. Security teams are struggling with a growing attack surface Disconcertingly,

React to this headline:

Loading spinner

Only 3% of organizations have a dedicated budget for SaaS security Read More »

How to use iCloud Private Relay for enhanced privacy

How to use iCloud Private Relay for enhanced privacy 2025-02-03 at 06:04 By Help Net Security iCloud Private Relay, included with an iCloud+ subscription, enhances your privacy while browsing the web in Safari. When this feature is enabled, the traffic leaving your iPhone is encrypted and routed through two separate internet relays. This ensures that

React to this headline:

Loading spinner

How to use iCloud Private Relay for enhanced privacy Read More »

Deploying AI at the edge: The security trade-offs and how to manage them

Deploying AI at the edge: The security trade-offs and how to manage them 2025-01-31 at 07:34 By Mirko Zorz Deploying AI at the edge brings advantages such as low latency, improved efficiency, and real-time decision-making. It also introduces new attack surfaces. Adversaries could intercept models in transit, manipulate inputs to degrade performance, or even reverse-engineer

React to this headline:

Loading spinner

Deploying AI at the edge: The security trade-offs and how to manage them Read More »

Platformization is key to reduce cybersecurity complexity

Platformization is key to reduce cybersecurity complexity 2025-01-31 at 07:03 By Help Net Security Organizations are facing security complexity challenges as they juggle an average of 83 different security solutions from 29 vendors, according to a report by IBM and Palo Alto Networks. It also shows 7 out of 10 surveyed companies with a high

React to this headline:

Loading spinner

Platformization is key to reduce cybersecurity complexity Read More »

UK, US Introduce “Content Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI

UK, US Introduce “Content Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI 2025-01-30 at 13:03 By daksh sharma Overview The rapid evolution of generative artificial intelligence (AI) has introduced both opportunities and risks in the digital landscape. While AI-generated content can enhance creativity and efficiency, it also presents significant challenges related to

React to this headline:

Loading spinner

UK, US Introduce “Content Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI Read More »

Zscaler CISO on balancing security and user convenience in hybrid work environments

Zscaler CISO on balancing security and user convenience in hybrid work environments 2025-01-30 at 07:33 By Mirko Zorz In this Help Net Security interview, Sean Cordero, CISO at Zscaler, talks about securing hybrid work and the new challenges it presents to cybersecurity teams. He discusses how hybrid work has exposed gaps in traditional security models

React to this headline:

Loading spinner

Zscaler CISO on balancing security and user convenience in hybrid work environments Read More »

89% of AI-powered APIs rely on insecure authentication mechanisms

89% of AI-powered APIs rely on insecure authentication mechanisms 2025-01-30 at 06:33 By Help Net Security APIs have emerged as the predominant attack surface over the past year, with AI being the biggest driver of API security risks, according to Wallarm. “Based on our findings, what is clear is that API security is no longer

React to this headline:

Loading spinner

89% of AI-powered APIs rely on insecure authentication mechanisms Read More »

Scroll to Top