Expert corner

Scam Yourself attacks: How social engineering is evolving

Scam Yourself attacks: How social engineering is evolving 2025-01-21 at 07:30 By Help Net Security We’ve entered a new era where verification must come before trust, and for good reason. Cyber threats are evolving rapidly, and one of the trends getting a fresh reboot in 2025 is the “scam yourself” attacks. These aren’t your run-of-the-mill […]

React to this headline:

Loading spinner

Scam Yourself attacks: How social engineering is evolving Read More »

Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?

Decentralization is happening everywhere, so why are crypto wallets “walled gardens”? 2025-01-20 at 07:34 By Help Net Security The twin cryptocurrency and digital identity revolutions are supposed to be building a better future, where anybody can take charge of their sovereignty and security in a world where both face unprecedented threats. Yet at one crucial

React to this headline:

Loading spinner

Decentralization is happening everywhere, so why are crypto wallets “walled gardens”? Read More »

A humble proposal: The InfoSec CIA triad should be expanded

A humble proposal: The InfoSec CIA triad should be expanded 2025-01-16 at 06:35 By Help Net Security The inconsistent and incomplete definitions of essential properties in information security create confusion within the InfoSec community, gaps in security controls, and may elevate the costs of incidents. In this article, I will analyze the CIA triad, point

React to this headline:

Loading spinner

A humble proposal: The InfoSec CIA triad should be expanded Read More »

This is the year CISOs unlock AI’s full potential

This is the year CISOs unlock AI’s full potential 2025-01-14 at 07:31 By Help Net Security In 2025, CISOs will have powerful new capabilities as generative artificial intelligence (GenAI) continues to mature. Evolving beyond providing answers to questions, GenAI will provide proactive recommendations, take action, and communicate in a personalized manner. This transition will enable

React to this headline:

Loading spinner

This is the year CISOs unlock AI’s full potential Read More »

Time for a change: Elevating developers’ security skills

Time for a change: Elevating developers’ security skills 2025-01-13 at 06:07 By Help Net Security Organizations don’t know their software engineers’ security skills because they don’t assess them in the interview process. Trying to do that in an interview is challenging, of course, given the time it takes for a proper assessment. However, given the

React to this headline:

Loading spinner

Time for a change: Elevating developers’ security skills Read More »

The SBI fake banking app shows that SMS authentication has had its day

The SBI fake banking app shows that SMS authentication has had its day 2025-01-10 at 07:01 By Help Net Security As a company fortunate enough to have and maintain our own pentesting team, we often do outreach with other organizations to assist with or provide our expertise in offensive security. In collaboration with the Kerala

React to this headline:

Loading spinner

The SBI fake banking app shows that SMS authentication has had its day Read More »

Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd

Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd 2025-01-09 at 06:59 By Help Net Security As we look ahead to cybersecurity developments in 2025, there’s bad news and good—expect to see new challenging attacks and the cybersecurity community increasingly working together to counter threats that are beyond the scope of

React to this headline:

Loading spinner

Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd Read More »

Why an “all gas, no brakes” approach for AI use won’t work

Why an “all gas, no brakes” approach for AI use won’t work 2025-01-08 at 07:33 By Help Net Security Machine learning and generative AI are changing the way knowledge workers do their jobs. Every company is eager to be “an AI company,” but AI can often seem like a black box, and the fear of

React to this headline:

Loading spinner

Why an “all gas, no brakes” approach for AI use won’t work Read More »

Making the most of cryptography, now and in the future

Making the most of cryptography, now and in the future 2025-01-07 at 08:03 By Help Net Security Enterprise cryptography faces risks beyond just the advent of quantum computers. For starters, there is no guarantee that the traditional algorithms have not been broken. Though we believe that it is “unlikely” they can be, the reality is

React to this headline:

Loading spinner

Making the most of cryptography, now and in the future Read More »

The modern CISO is a cornerstone of organizational success

The modern CISO is a cornerstone of organizational success 2025-01-03 at 07:36 By Help Net Security The chief information security officer (CISO) role has undergone a remarkable transformation, evolving from a purely technical position to a role that bridges business strategy, operational efficiency, and cybersecurity. The post The modern CISO is a cornerstone of organizational

React to this headline:

Loading spinner

The modern CISO is a cornerstone of organizational success Read More »

The future of data and AI: Seven trends shaping 2025 and beyond

The future of data and AI: Seven trends shaping 2025 and beyond 2024-12-27 at 07:31 By Help Net Security In 2025, seven trends will shape the future of data and AI, offering advantages for those who see these changes not as challenges but as opportunities to innovate and excel. The post The future of data

React to this headline:

Loading spinner

The future of data and AI: Seven trends shaping 2025 and beyond Read More »

2025 is going to be a bumpy year for IoT

2025 is going to be a bumpy year for IoT 2024-12-24 at 08:18 By Help Net Security In the Internet of Things (IoT) sector, 2025 is shaping up to be a politically charged year. Major global jurisdictions are set to implement device security regulations, coinciding with potential tariffs, shifting production dynamics, and rising geopolitical tensions.

React to this headline:

Loading spinner

2025 is going to be a bumpy year for IoT Read More »

Are threat feeds masking your biggest security blind spot?

Are threat feeds masking your biggest security blind spot? 2024-12-19 at 07:33 By Help Net Security Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind

React to this headline:

Loading spinner

Are threat feeds masking your biggest security blind spot? Read More »

CISO accountability: Navigating a landscape of responsibility

CISO accountability: Navigating a landscape of responsibility 2024-12-18 at 07:36 By Help Net Security What was once primarily a technical role, CISOs now find themselves accountable for organizational risk, regulatory compliance, and even legal liabilities across the entire organization. However, as cyber threats intensify, it’s clear that overseeing cybersecurity operations enterprise-wide is not feasible for

React to this headline:

Loading spinner

CISO accountability: Navigating a landscape of responsibility Read More »

The shifting security landscape: 2025 predictions and challenges

The shifting security landscape: 2025 predictions and challenges 2024-12-17 at 07:33 By Help Net Security As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s plan calls for integrated cyber defense across borders, addressing the complex, global cybersecurity challenges that businesses, governments

React to this headline:

Loading spinner

The shifting security landscape: 2025 predictions and challenges Read More »

With DORA approaching, financial institutions must strengthen their cyber resilience

With DORA approaching, financial institutions must strengthen their cyber resilience 2024-12-16 at 07:33 By Help Net Security The clock is ticking for financial institutions across the EU as the January 17, 2025, deadline for the Digital Operational Resilience Act (DORA) approaches. This regulation will reshape how organizations in the financial sector approach cybersecurity and operational

React to this headline:

Loading spinner

With DORA approaching, financial institutions must strengthen their cyber resilience Read More »

We must adjust expectations for the CISO role

We must adjust expectations for the CISO role 2024-12-12 at 11:52 By Help Net Security Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information security officer (CISO) role, once a back-office function primarily focused on technical oversight, has moved squarely into the executive spotlight.

React to this headline:

Loading spinner

We must adjust expectations for the CISO role Read More »

Preventing data leakage in low-node/no-code environments

Preventing data leakage in low-node/no-code environments 2024-12-10 at 07:34 By Help Net Security Low-code/no-code (LCNC) platforms enable application development by citizen developers, often generating “shadow engineering” projects that evade security oversight. While LCNC solutions like Power BI reports and automated workflows foster agility and innovation, they also introduce significant risks, including data leakage. Data leakage

React to this headline:

Loading spinner

Preventing data leakage in low-node/no-code environments Read More »

Preparing for Q-day: The essential role of cloud migration in securing enterprise data

Preparing for Q-day: The essential role of cloud migration in securing enterprise data 2024-12-05 at 07:34 By Help Net Security As the era of quantum computing draws closer, businesses face a new and unprecedented threat to data security: “Q-day.” This looming turning point—when quantum machines can break traditional encryption with ease—has the potential to upend

React to this headline:

Loading spinner

Preparing for Q-day: The essential role of cloud migration in securing enterprise data Read More »

5 reasons to double down on network security

5 reasons to double down on network security 2024-12-02 at 07:33 By Help Net Security Cybersecurity programs have evolved significantly over the past few decades. The advent of cloud computing shattered the conventional corporate perimeter, forcing organizations to update their defense strategies. Today, with the rise of work-from-anywhere and bring-your-own-device (BYOD) policies as well as

React to this headline:

Loading spinner

5 reasons to double down on network security Read More »

Scroll to Top