Hot stuff

Making the most of cryptography, now and in the future

Making the most of cryptography, now and in the future 2025-01-07 at 08:03 By Help Net Security Enterprise cryptography faces risks beyond just the advent of quantum computers. For starters, there is no guarantee that the traditional algorithms have not been broken. Though we believe that it is “unlikely” they can be, the reality is […]

React to this headline:

Loading spinner

Making the most of cryptography, now and in the future Read More »

eBay CISO on managing long-term cybersecurity planning and ROI

eBay CISO on managing long-term cybersecurity planning and ROI 2025-01-07 at 07:33 By Mirko Zorz In this Help Net Security interview, Sean Embry, CISO at eBay, discusses key aspects of cybersecurity leadership. He shares insights on balancing long-term strategic planning with immediate threat response, evaluating the ROI of new technologies, and addressing employee cybersecurity fatigue.

React to this headline:

Loading spinner

eBay CISO on managing long-term cybersecurity planning and ROI Read More »

Open source worldwide: Critical maintenance gaps exposed

Open source worldwide: Critical maintenance gaps exposed 2025-01-07 at 06:31 By Help Net Security Lineaje recently released a report identifying the US and Russia as the leading generators of open-source projects, with both countries also having the highest numbers of anonymous open-source contributions. In this Help Net Security video, Nick Mistry, SVP and CISO of

React to this headline:

Loading spinner

Open source worldwide: Critical maintenance gaps exposed Read More »

Balancing proprietary and open-source tools in cyber threat research

Balancing proprietary and open-source tools in cyber threat research 2025-01-06 at 07:38 By Mirko Zorz In this Help Net Security interview, Thomas Roccia, Senior Security Researcher at Microsoft, discusses how threat research drives faster, better decision-making in cybersecurity operations. Roccia provides insights into balancing internal and external research strategies, the influence of AI and geopolitical

React to this headline:

Loading spinner

Balancing proprietary and open-source tools in cyber threat research Read More »

The modern CISO is a cornerstone of organizational success

The modern CISO is a cornerstone of organizational success 2025-01-03 at 07:36 By Help Net Security The chief information security officer (CISO) role has undergone a remarkable transformation, evolving from a purely technical position to a role that bridges business strategy, operational efficiency, and cybersecurity. The post The modern CISO is a cornerstone of organizational

React to this headline:

Loading spinner

The modern CISO is a cornerstone of organizational success Read More »

Best practices for ensuring a secure browsing environment

Best practices for ensuring a secure browsing environment 2025-01-03 at 07:36 By Mirko Zorz In this Help Net Security interview, Devin Ertel, CISO at Menlo Security, discusses how innovations like AI and closer collaboration between browser vendors and security providers will shape the future of browser security. The post Best practices for ensuring a secure

React to this headline:

Loading spinner

Best practices for ensuring a secure browsing environment Read More »

Kata Containers: Open-source container runtime, building lightweight VMs

Kata Containers: Open-source container runtime, building lightweight VMs 2025-01-02 at 07:04 By Mirko Zorz Kata Containers is an open-source project dedicated to creating a secure container runtime that combines the performance and simplicity of containers with the enhanced isolation of lightweight virtual machines. By leveraging hardware virtualization technology, it adds an extra layer of defense

React to this headline:

Loading spinner

Kata Containers: Open-source container runtime, building lightweight VMs Read More »

Why software is the key to FI risk management

Why software is the key to FI risk management 2024-12-31 at 07:33 By Help Net Security Risk management is important, but it’s not always exciting. Many risk professionals still rely on spreadsheets and manual methods despite the availability of better options. Excel is familiar and cost-effective. Some spreadsheets are handy for certain risk management activities.

React to this headline:

Loading spinner

Why software is the key to FI risk management Read More »

The sixth sense of cybersecurity: How AI spots threats before they strike

The sixth sense of cybersecurity: How AI spots threats before they strike 2024-12-30 at 07:47 By Mirko Zorz In this Help Net Security interview, Vineet Chaku, President of Reaktr.ai, discusses how AI is transforming cybersecurity, particularly in anomaly detection and threat identification. Chaku talks about the skills cybersecurity professionals need to collaborate with AI systems

React to this headline:

Loading spinner

The sixth sense of cybersecurity: How AI spots threats before they strike Read More »

The future of data and AI: Seven trends shaping 2025 and beyond

The future of data and AI: Seven trends shaping 2025 and beyond 2024-12-27 at 07:31 By Help Net Security In 2025, seven trends will shape the future of data and AI, offering advantages for those who see these changes not as challenges but as opportunities to innovate and excel. The post The future of data

React to this headline:

Loading spinner

The future of data and AI: Seven trends shaping 2025 and beyond Read More »

Overwhelmed by fraud? Here’s how financial pros fight back

Overwhelmed by fraud? Here’s how financial pros fight back 2024-12-27 at 07:04 By Mirko Zorz In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the growing threat of deepfake-related fraud and its impact on financial security. He also discusses overlooked vulnerabilities in digital banking and offers advice for organizations to

React to this headline:

Loading spinner

Overwhelmed by fraud? Here’s how financial pros fight back Read More »

2025 is going to be a bumpy year for IoT

2025 is going to be a bumpy year for IoT 2024-12-24 at 08:18 By Help Net Security In the Internet of Things (IoT) sector, 2025 is shaping up to be a politically charged year. Major global jurisdictions are set to implement device security regulations, coinciding with potential tariffs, shifting production dynamics, and rising geopolitical tensions.

React to this headline:

Loading spinner

2025 is going to be a bumpy year for IoT Read More »

How CISOs can make smarter risk decisions

How CISOs can make smarter risk decisions 2024-12-24 at 07:03 By Mirko Zorz In this Help Net Security interview, Gavin Reid, CISO at HUMAN Security, talks about the latest cybersecurity threats and how attackers are becoming more sophisticated. He explains the difficulties organizations encounter in detecting fraud and malicious bots while keeping the user experience

React to this headline:

Loading spinner

How CISOs can make smarter risk decisions Read More »

US charges suspected LockBit ransomware developer

US charges suspected LockBit ransomware developer 2024-12-23 at 16:37 By Zeljka Zorz The US Department of Justice has unsealed charges against Rostislav Panev, 51, a dual Russian and Israeli national, suspected of being a developer for the LockBit ransomware group. Panev was arrested in August 2024 and is currently in custody in Israel pending extradition.

React to this headline:

Loading spinner

US charges suspected LockBit ransomware developer Read More »

NFT scammers charged for stealing $22 million through “rug pulls”

NFT scammers charged for stealing $22 million through “rug pulls” 2024-12-23 at 14:50 By Help Net Security A six-count indictment was unsealed on Friday in Los Angeles charging two California men with defrauding investors of more than $22 million in cryptocurrency through a series of digital asset project “rug pulls,” a type of fraud scheme

React to this headline:

Loading spinner

NFT scammers charged for stealing $22 million through “rug pulls” Read More »

Evilginx: Open-source man-in-the-middle attack framework

Evilginx: Open-source man-in-the-middle attack framework 2024-12-23 at 07:37 By Mirko Zorz Evilginx is an open-source man-in-the-middle attack framework designed to phish login credentials and session cookies, enabling attackers to bypass 2FA safeguards. “Back in 2017, I was experimenting with extracting cookies from one browser and importing them into another. I realized this technique could effectively

React to this headline:

Loading spinner

Evilginx: Open-source man-in-the-middle attack framework Read More »

Maximizing the impact of cybercrime intelligence on business resilience

Maximizing the impact of cybercrime intelligence on business resilience 2024-12-23 at 07:16 By Mirko Zorz In this Help Net Security interview, Jason Passwaters, CEO of Intel 471, discusses how integrating cybercrime intelligence into an organization’s security strategy enables proactive threat management and how measuring intelligence efforts can help mitigate risks before they escalate. Passwaters also

React to this headline:

Loading spinner

Maximizing the impact of cybercrime intelligence on business resilience Read More »

How companies can fight ransomware impersonations

How companies can fight ransomware impersonations 2024-12-23 at 06:31 By Help Net Security As these threat actors become increasingly strategic and harder to detect, organizations must take all measures to protect their data, including cybersecurity training. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead at Skyhigh Security, discusses how companies can

React to this headline:

Loading spinner

How companies can fight ransomware impersonations Read More »

CISA: Use Signal or other secure communications app

CISA: Use Signal or other secure communications app 2024-12-20 at 14:57 By Zeljka Zorz In the wake of the widespread compromise of US telecom giants’ networks by Chinese hackers and the FBI advising Americans to use end-to-end encrypted communications, CISA is advising “highly targeted individuals” – senior government officials and politicians – to lock down

React to this headline:

Loading spinner

CISA: Use Signal or other secure communications app Read More »

Another NetWalker affiliate sentenced to 20 years in prison

Another NetWalker affiliate sentenced to 20 years in prison 2024-12-20 at 13:07 By Zeljka Zorz A 30-year old Romanian man was sentenced to 20 years in prison for leveraging the Netwalker ransomware to extort money from victims, the US Department of Justice announced on Thursday. Daniel Christian Hulea, of Jucu de Mijloc, Cluj, Romania, was

React to this headline:

Loading spinner

Another NetWalker affiliate sentenced to 20 years in prison Read More »

Scroll to Top