Don’t miss

Quantifying cyber risk strategies to resonate with CFOs and boards

Quantifying cyber risk strategies to resonate with CFOs and boards 2025-03-14 at 17:02 By Mirko Zorz In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a more strategic role within their organizations. He explains that aligning cybersecurity […]

React to this headline:

Loading spinner

Quantifying cyber risk strategies to resonate with CFOs and boards Read More »

Top 5 threats keeping CISOs up at night in 2025

Top 5 threats keeping CISOs up at night in 2025 2025-03-14 at 08:05 By Help Net Security Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing AI-driven security, ransomware resilience, supply chain risk management, insider threat mitigation, and compliance preparedness,

React to this headline:

Loading spinner

Top 5 threats keeping CISOs up at night in 2025 Read More »

CISOs, are your medical devices secure? Attackers are watching closely

CISOs, are your medical devices secure? Attackers are watching closely 2025-03-13 at 08:02 By Mirko Zorz The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has also introduced cybersecurity challenges to safeguard patient safety and uphold organizational security. Securing IoMT: Prioritizing risks

React to this headline:

Loading spinner

CISOs, are your medical devices secure? Attackers are watching closely Read More »

Cybersecurity classics: 10 books that shaped the industry

Cybersecurity classics: 10 books that shaped the industry 2025-03-13 at 07:32 By Help Net Security Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a CISO, a seasoned expert, or cybersecurity enthusiast, these must-reads belong on your shelf. Masters of

React to this headline:

Loading spinner

Cybersecurity classics: 10 books that shaped the industry Read More »

NIST selects HQC as backup algorithm for post-quantum encryption

NIST selects HQC as backup algorithm for post-quantum encryption 2025-03-12 at 13:32 By Help Net Security Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has selected a backup algorithm that can provide a second line of defense for the

React to this headline:

Loading spinner

NIST selects HQC as backup algorithm for post-quantum encryption Read More »

NetBird: Open-source network security

NetBird: Open-source network security 2025-03-12 at 08:03 By Help Net Security NetBird is an open-source solution that integrates a configuration-free peer-to-peer private network with centralized access control, providing a single platform to build secure private networks for your organization or home. NetBird features NetBird creates a WireGuard-based overlay network that automatically connects your machines over

React to this headline:

Loading spinner

NetBird: Open-source network security Read More »

Burnout in cybersecurity: How CISOs can protect their teams (and themselves)

Burnout in cybersecurity: How CISOs can protect their teams (and themselves) 2025-03-12 at 07:37 By Mirko Zorz Cybersecurity is a high-stakes, high-pressure field in which CISOs and their teams constantly battle threats, compliance requirements, and business expectations. The demand for 24/7 vigilance, sophisticated attacks, and a shortage of skilled professionals have led to a burnout

React to this headline:

Loading spinner

Burnout in cybersecurity: How CISOs can protect their teams (and themselves) Read More »

Defending against EDR bypass attacks

Defending against EDR bypass attacks 2025-03-12 at 07:06 By Help Net Security EDR bypass and killer attacks are surging, yet many organizations continue to overlook this threat while they have become over-reliant on this security tool – particularly when preventing ransomware. In this Help Net Security video, John Dwyer, Director of Security Research at Binary

React to this headline:

Loading spinner

Defending against EDR bypass attacks Read More »

Smart cybersecurity spending and how CISOs can invest where it matters

Smart cybersecurity spending and how CISOs can invest where it matters 2025-03-11 at 08:30 By Mirko Zorz CISOs face mounting pressure to spend wisely on security. Yet, many organizations remain vulnerable due to misplaced priorities and inefficient budgeting. This article explores common pitfalls and offers strategies to strengthen cybersecurity. Recent data highlights a paradox: while

React to this headline:

Loading spinner

Smart cybersecurity spending and how CISOs can invest where it matters Read More »

How remote work strengthens cybersecurity teams

How remote work strengthens cybersecurity teams 2025-03-11 at 07:32 By Anamarija Pogorelec The global transition to remote work has reshaped traditional workplace dynamics, introducing challenges and opportunities for cybersecurity teams. For CISOs and security professionals, embracing a remote workforce can be a strategic advantage, enhancing team capabilities and driving the modernization of security practices. Specialized

React to this headline:

Loading spinner

How remote work strengthens cybersecurity teams Read More »

Review: The Cybersecurity Trinity

Review: The Cybersecurity Trinity 2025-03-10 at 18:02 By Mirko Zorz The Cybersecurity Trinity provides a comprehensive approach to modern cybersecurity by integrating AI, automation, and active cyber defense (ACD) into a unified strategy. Instead of addressing these elements in isolation, the author demonstrates how they work together to enhance security effectiveness, offering a practical and

React to this headline:

Loading spinner

Review: The Cybersecurity Trinity Read More »

March 2025 Patch Tuesday forecast: A return to normalcy

March 2025 Patch Tuesday forecast: A return to normalcy 2025-03-10 at 08:33 By Help Net Security The February Patch Tuesday updates and activity during the month marked a return to normalcy for patch management. Following the January updates addressing 100+ vulnerabilities, we saw 37 CVEs fixed in Windows 11 and 33 CVEs in Windows 10.

React to this headline:

Loading spinner

March 2025 Patch Tuesday forecast: A return to normalcy Read More »

Hetty: Open-source HTTP toolkit for security research

Hetty: Open-source HTTP toolkit for security research 2025-03-10 at 08:17 By Help Net Security Hetty is an open-source HTTP toolkit designed for security research, offering a free alternative to commercial tools like Burp Suite Pro. Built with the needs of penetration testers, security professionals, and bug bounty hunters in mind, Hetty provides a set of

React to this headline:

Loading spinner

Hetty: Open-source HTTP toolkit for security research Read More »

How to safely dispose of old tech without leaving a security risk

How to safely dispose of old tech without leaving a security risk 2025-03-10 at 07:30 By Help Net Security Every year, millions of old tech are thrown away due to age, malfunctions, or to make way for new ones, which creates security risks related to the data on these devices. The data can often still

React to this headline:

Loading spinner

How to safely dispose of old tech without leaving a security risk Read More »

Who’s in your digital house? The truth about third-party access

Who’s in your digital house? The truth about third-party access 2025-03-10 at 07:01 By Help Net Security In this Help Net Security video, Fran Rosch, CEO at Imprivata, discusses organizations’ challenges in securing third-party access and offers valuable insights on how businesses can address these risks effectively. A recent report conducted by the Ponemon Institute,

React to this headline:

Loading spinner

Who’s in your digital house? The truth about third-party access Read More »

Can AI-powered gamified simulations help cybersecurity teams keep up?

Can AI-powered gamified simulations help cybersecurity teams keep up? 2025-03-07 at 08:04 By Mirko Zorz Traditional training often lacks the hands-on experience cybersecurity teams need to counter advanced threats. AI-powered gamified simulations combine artificial intelligence with interactive learning to enhance their skills. Conventional cybersecurity training programs frequently rely on static content, which can become outdated.

React to this headline:

Loading spinner

Can AI-powered gamified simulations help cybersecurity teams keep up? Read More »

AI threats and workforce shortages put pressure on security leaders

AI threats and workforce shortages put pressure on security leaders 2025-03-07 at 07:30 By Help Net Security In this Help Net Security video, John Grancarich, Fortra’s Chief Strategy Officer, discusses the 2025 Fortra State of Cybersecurity Survey and highlights escalating concerns among security professionals about AI-driven threats and a shortage of cybersecurity skills. The survey

React to this headline:

Loading spinner

AI threats and workforce shortages put pressure on security leaders Read More »

The CISO’s bookshelf: 10 must-reads for security leaders

The CISO’s bookshelf: 10 must-reads for security leaders 2025-03-06 at 07:56 By Help Net Security Discover essential reads for CISOs in this curated list of books covering cybersecurity leadership, risk management, zero trust, board communication, and more. Why CISOs Fail, 2nd Edition Author: Barak Engel Barak Engel expands on the ideas from his original 2017

React to this headline:

Loading spinner

The CISO’s bookshelf: 10 must-reads for security leaders Read More »

The 5 stages of incident response grief

The 5 stages of incident response grief 2025-03-05 at 18:03 By Help Net Security Whether we recognize it or not, anytime an incident occurs, it sets off the grieving process. But grief isn’t a bad thing: it’s how we process our emotional reactions and move on. That’s precisely what security teams need to do in

React to this headline:

Loading spinner

The 5 stages of incident response grief Read More »

Fix Inventory: Open-source cloud asset inventory tool

Fix Inventory: Open-source cloud asset inventory tool 2025-03-05 at 08:04 By Help Net Security Fix Inventory is an open-source tool for detecting compliance and security risks in cloud infrastructure accounts. It was built from the ground up for cloud-native environments and provides broad support for over 300 cloud services, including AWS, Google Cloud Platform, Azure,

React to this headline:

Loading spinner

Fix Inventory: Open-source cloud asset inventory tool Read More »

Scroll to Top