Expert corner

Android financial threats: What businesses need to know to protect themselves and their customers

Android financial threats: What businesses need to know to protect themselves and their customers 2025-03-28 at 08:30 By Help Net Security The rise of mobile banking has changed how businesses and customers interact. It brought about increased convenience and efficiency, but has also opened new doors for cybercriminals, particularly on the Android platform, which dominates […]

React to this headline:

Loading spinner

Android financial threats: What businesses need to know to protect themselves and their customers Read More »

A CISO’s guide to securing AI models

A CISO’s guide to securing AI models 2025-03-26 at 08:05 By Help Net Security In AI applications, machine learning (ML) models are the core decision-making engines that drive predictions, recommendations, and autonomous actions. Unlike traditional IT applications, which rely on predefined rules and static algorithms, ML models are dynamic—they develop their own internal patterns and

React to this headline:

Loading spinner

A CISO’s guide to securing AI models Read More »

Spring clean your security data: The case for cybersecurity data hygiene

Spring clean your security data: The case for cybersecurity data hygiene 2025-03-25 at 08:41 By Help Net Security Spring cleaning isn’t just for your closets; security teams should take the same approach to their security operations data, where years of unchecked log growth have created a bloated, inefficient and costly mess. The modern Security Operations

React to this headline:

Loading spinner

Spring clean your security data: The case for cybersecurity data hygiene Read More »

The hidden risk in SaaS: Why companies need a digital identity exit strategy

The hidden risk in SaaS: Why companies need a digital identity exit strategy 2025-03-21 at 08:31 By Help Net Security In the face of sudden trade restrictions, sanctions, or policy shifts, relying on SaaS providers outside your region for identity services is a gamble that companies can no longer afford to take. With trade disputes

React to this headline:

Loading spinner

The hidden risk in SaaS: Why companies need a digital identity exit strategy Read More »

5 pitfalls that can delay cyber incident response and recovery

5 pitfalls that can delay cyber incident response and recovery 2025-03-20 at 08:35 By Help Net Security The responsibility of cyber incident response falls squarely on the shoulders of the CISO. And many CISOs invest heavily in technical response procedures, tabletop exercises and theoretical plans only to find out that when an actual breach strikes

React to this headline:

Loading spinner

5 pitfalls that can delay cyber incident response and recovery Read More »

The rise of DAST 2.0 in 2025

The rise of DAST 2.0 in 2025 2025-03-18 at 18:02 By Help Net Security Static Application Security Testing (SAST) found favor among security teams as an easy way to deploy security testing without really engaging developers. With the ability to analyze source code early in the software delivery lifecycle, SAST solutions offered a more proactive

React to this headline:

Loading spinner

The rise of DAST 2.0 in 2025 Read More »

The 5 stages of incident response grief

The 5 stages of incident response grief 2025-03-05 at 18:03 By Help Net Security Whether we recognize it or not, anytime an incident occurs, it sets off the grieving process. But grief isn’t a bad thing: it’s how we process our emotional reactions and move on. That’s precisely what security teams need to do in

React to this headline:

Loading spinner

The 5 stages of incident response grief Read More »

Prioritizing data and identity security in 2025

Prioritizing data and identity security in 2025 2025-03-04 at 17:02 By Help Net Security To say that the cybersecurity landscape has grown more complex over the past several years would be a dramatic understatement. Attackers have more resources at their fingertips than ever, and data breaches have become almost a daily occurrence. For both businesses

React to this headline:

Loading spinner

Prioritizing data and identity security in 2025 Read More »

Debunking 5 myths about network automation

Debunking 5 myths about network automation 2025-02-27 at 06:02 By Help Net Security Imagine you’re a network engineer at an enterprise. You already have your hands full with IT priorities, including managing bandwidth related to working from home, the company’s new data center, and, more recently, computing needs to support AI adoption. Additionally, the security

React to this headline:

Loading spinner

Debunking 5 myths about network automation Read More »

Cybersecurity needs a leader, so let’s stop debating and start deciding

Cybersecurity needs a leader, so let’s stop debating and start deciding 2025-02-25 at 18:09 By Help Net Security Have you ever heard anyone earnestly ask in a business, “Who owns legal?” or “Who sets the financial strategy?” Probably not – it should be obvious, right? Yet, when it comes to cybersecurity, the question of ownership

React to this headline:

Loading spinner

Cybersecurity needs a leader, so let’s stop debating and start deciding Read More »

6 considerations for 2025 cybersecurity investment decisions

6 considerations for 2025 cybersecurity investment decisions 2025-02-18 at 18:33 By Help Net Security Cybersecurity professionals may be concerned about the constantly shifting threat landscape. From the increased use of artificial intelligence (AI) by malicious actors to the expanding attack surface, cybersecurity risks evolve, and defenders need to mitigate them. Despite a period of cybersecurity

React to this headline:

Loading spinner

6 considerations for 2025 cybersecurity investment decisions Read More »

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance 2025-02-13 at 07:30 By Help Net Security The United Kingdom government has secretly requested that Apple build a backdoor into its iCloud service, granting the government unrestricted access to users’ private data. This revelation deeply concerns me – it is a blatant

React to this headline:

Loading spinner

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance Read More »

It’s time to secure the extended digital supply chain

It’s time to secure the extended digital supply chain 2025-02-12 at 07:35 By Help Net Security Organizations’ increasing reliance on third-party software and services has created an environment with more vulnerabilities and harder-to-detect risks. Attackers know they can increase efficiency and profitability by compromising the supply chain and are focusing their efforts accordingly. The commoditization

React to this headline:

Loading spinner

It’s time to secure the extended digital supply chain Read More »

February 2025 Patch Tuesday forecast: New directions for AI development

February 2025 Patch Tuesday forecast: New directions for AI development 2025-02-10 at 08:02 By Help Net Security The new year has started with a whirlwind of activity, and one of the hottest topics in the news is the increasing emphasis on AI. DeepSeek ad Stargate DeepSeek took the world by storm as millions of copies

React to this headline:

Loading spinner

February 2025 Patch Tuesday forecast: New directions for AI development Read More »

Security validation: The new standard for cyber resilience

Security validation: The new standard for cyber resilience 2025-02-10 at 07:37 By Help Net Security Security validation has officially turned a corner. Once considered a “nice-to-have” it’s now a top priority for security leaders worldwide. This shift has been accelerated by frameworks like Gartner’s Continuous Threat Exposure Management (CTEM), introduced in 2022, which emphasizes the

React to this headline:

Loading spinner

Security validation: The new standard for cyber resilience Read More »

Self-sovereign identity could transform fraud prevention, but…

Self-sovereign identity could transform fraud prevention, but… 2025-02-07 at 10:03 By Help Net Security The way we manage digital identity is fundamentally broken. The root of the problem lies in traditional, centralized identity models, where a single organization holds and controls a user’s credentials, creating an attractive target for attackers. The bigger the database, the

React to this headline:

Loading spinner

Self-sovereign identity could transform fraud prevention, but… Read More »

Aim for crypto-agility, prepare for the long haul

Aim for crypto-agility, prepare for the long haul 2025-02-04 at 07:33 By Help Net Security While organizations have long experimented with various facets of digital transformation, the journey toward crypto-agility is one of the most significant technological transitions of our time. Success in the emerging quantum era will require technical expertise, strategic foresight, careful planning,

React to this headline:

Loading spinner

Aim for crypto-agility, prepare for the long haul Read More »

AI security posture management will be needed before agentic AI takes hold

AI security posture management will be needed before agentic AI takes hold 2025-01-27 at 07:40 By Help Net Security As I’m currently knee deep in testing agentic AI in all its forms, as well as new iterations of current generative AI models such as OpenAI’s O1, the complexities of securing AI bot frameworks for enterprise

React to this headline:

Loading spinner

AI security posture management will be needed before agentic AI takes hold Read More »

Scam Yourself attacks: How social engineering is evolving

Scam Yourself attacks: How social engineering is evolving 2025-01-21 at 07:30 By Help Net Security We’ve entered a new era where verification must come before trust, and for good reason. Cyber threats are evolving rapidly, and one of the trends getting a fresh reboot in 2025 is the “scam yourself” attacks. These aren’t your run-of-the-mill

React to this headline:

Loading spinner

Scam Yourself attacks: How social engineering is evolving Read More »

Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?

Decentralization is happening everywhere, so why are crypto wallets “walled gardens”? 2025-01-20 at 07:34 By Help Net Security The twin cryptocurrency and digital identity revolutions are supposed to be building a better future, where anybody can take charge of their sovereignty and security in a world where both face unprecedented threats. Yet at one crucial

React to this headline:

Loading spinner

Decentralization is happening everywhere, so why are crypto wallets “walled gardens”? Read More »

Scroll to Top