skill development

What happens when penetration testing goes virtual and gets an AI coach

What happens when penetration testing goes virtual and gets an AI coach 2025-08-19 at 09:32 By Mirko Zorz Cybersecurity training often struggles to match the complexity of threats. A new approach combining digital twins and LLMs aims to close that gap. Researchers from the University of Bari Aldo Moro propose using Cyber Digital Twins (CDTs) […]

React to this headline:

Loading spinner

What happens when penetration testing goes virtual and gets an AI coach Read More »

Review: Data Engineering for Cybersecurity

Review: Data Engineering for Cybersecurity 2025-08-18 at 08:12 By Mirko Zorz Data Engineering for Cybersecurity sets out to bridge a gap many security teams encounter: knowing what to do with the flood of logs, events, and telemetry they collect. About the author James Bonifield has a decade of experience analyzing malicious activity, implementing data pipelines,

React to this headline:

Loading spinner

Review: Data Engineering for Cybersecurity Read More »

How military leadership prepares veterans for cybersecurity success

How military leadership prepares veterans for cybersecurity success 2025-08-15 at 09:47 By Mirko Zorz In this Help Net Security interview, Warren O’Driscoll, Head of Security Practice at NTT DATA UK and Ireland, discusses how military leadership training equips veterans with the mindset, resilience, and strategic thinking needed to excel in cybersecurity. Drawing on habits such

React to this headline:

Loading spinner

How military leadership prepares veterans for cybersecurity success Read More »

Free courses: Master AI tools from Microsoft, AWS, and Google

Free courses: Master AI tools from Microsoft, AWS, and Google 2025-08-14 at 07:32 By Anamarija Pogorelec Learn how AI technologies can be applied to enhance security, create safe and responsible applications, develop intelligent agents, and improve information discovery. You’ll gain practical skills, explore new tools, and work on projects that help you apply what you

React to this headline:

Loading spinner

Free courses: Master AI tools from Microsoft, AWS, and Google Read More »

Review: From Day Zero to Zero Day

Review: From Day Zero to Zero Day 2025-08-11 at 08:02 By Mirko Zorz From Day Zero to Zero Day is a practical guide for cybersecurity pros who want to move beyond reading about vulnerabilities and start finding them. It gives a methodical look at how real vulnerability research is done. About the author Eugene Lim

React to this headline:

Loading spinner

Review: From Day Zero to Zero Day Read More »

Review: CISA Certified Information Systems Auditor Practice Tests

Review: CISA Certified Information Systems Auditor Practice Tests 2025-08-01 at 08:02 By Mirko Zorz CISA Certified Information Systems Auditor Practice Tests offers practical, domain-by-domain prep for the CISA exam, with hundreds of questions covering key objectives and real-world systems audit skills. About the authors Peter H. Gregory is a best-selling cybersecurity author, educator, keynote speaker,

React to this headline:

Loading spinner

Review: CISA Certified Information Systems Auditor Practice Tests Read More »

Review: LLM Engineer’s Handbook

Review: LLM Engineer’s Handbook 2025-07-28 at 07:34 By Mirko Zorz For all the excitement around LLMs, practical, engineering-focused guidance remains surprisingly hard to find. LLM Engineer’s Handbook aims to fill that gap. About the authors Paul Iusztin is a Senior AI Engineer and founder of Decoding ML, a channel for content on learning how to

React to this headline:

Loading spinner

Review: LLM Engineer’s Handbook Read More »

Why outsourcing cybersecurity is rising in the Adriatic region

Why outsourcing cybersecurity is rising in the Adriatic region 2025-07-24 at 11:57 By Mirko Zorz In this Help Net Security interview, Aleksandar Stančin, Board Member Adriatics, Exclusive Networks, discusses the state of cybersecurity in the Adriatic region. He talks about how local markets often lag behind EU regulations, despite facing threats comparable to those in

React to this headline:

Loading spinner

Why outsourcing cybersecurity is rising in the Adriatic region Read More »

How to land your first job in cybersecurity

How to land your first job in cybersecurity 2025-07-21 at 09:54 By Help Net Security According to LinkedIn, job applications have surged over 45% in the past year, with 11,000 applications submitted every minute. This flood of applications is making it harder than ever for qualified candidates to stand out. The industry has become highly

React to this headline:

Loading spinner

How to land your first job in cybersecurity Read More »

Train smarter, respond faster: Close the skill gaps in your SOC

Train smarter, respond faster: Close the skill gaps in your SOC 2025-07-09 at 16:05 By Zeljka Zorz “In today’s fast-paced digital landscape” – as AI chatbots are fond of phrasing it – a cyber attack targeting your organization is a statistical certainty. But is your security team ready to respond when it happens? Can they

React to this headline:

Loading spinner

Train smarter, respond faster: Close the skill gaps in your SOC Read More »

Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future

Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future 2025-07-04 at 08:38 By Help Net Security While Africa hosts some of the fastest-growing digital economies globally, it also faces persistent challenges in cybersecurity preparedness. Many organizations and individuals remain unaware of the risks they face online. Phishing schemes and social

React to this headline:

Loading spinner

Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future Read More »

GenAI is everywhere, but security policies haven’t caught up

GenAI is everywhere, but security policies haven’t caught up 2025-07-01 at 08:07 By Help Net Security Nearly three out of four European IT and cybersecurity professionals say staff are already using generative AI at work, up ten points in a year, but just under a third of organizations have put formal policies in place, according

React to this headline:

Loading spinner

GenAI is everywhere, but security policies haven’t caught up Read More »

From posture to prioritization: The shift toward unified runtime platforms

From posture to prioritization: The shift toward unified runtime platforms 2025-06-25 at 08:49 By Mirko Zorz In this Help Net Security interview, Rinki Sethi, Chief Security Officer at Upwind, discusses how runtime platforms help CISOs shift from managing tools to managing risk. She encourages CISOs to position runtime as a practical layer for real-time risk

React to this headline:

Loading spinner

From posture to prioritization: The shift toward unified runtime platforms Read More »

Review: Learning Kali Linux, 2nd Edition

Review: Learning Kali Linux, 2nd Edition 2025-06-16 at 07:32 By Mirko Zorz Kali Linux has long been the go-to operating system for penetration testers and security professionals, and Learning Kali Linux, 2nd Edition by Ric Messier aims to guide readers through its core tools and use cases. This updated edition introduces new material on digital

React to this headline:

Loading spinner

Review: Learning Kali Linux, 2nd Edition Read More »

Security awareness training isn’t stopping breaches. Can AI help?

Security awareness training isn’t stopping breaches. Can AI help? 2025-06-02 at 07:31 By Help Net Security In this Help Net Security video, Mick Leach, Field CISO at Abnormal AI, explores why security awareness training (SAT) is failing to reduce human error, the top cause of cybersecurity incidents. He discusses how AI can transform SAT into

React to this headline:

Loading spinner

Security awareness training isn’t stopping breaches. Can AI help? Read More »

Review: Cybersecurity For Dummies, 3rd Edition

Review: Cybersecurity For Dummies, 3rd Edition 2025-05-29 at 07:01 By Mirko Zorz If you’re new to cybersecurity and looking for a book that doesn’t overwhelm you with jargon or dive too deep into technical territory, Cybersecurity For Dummies might be a solid starting point. It’s written with beginners in mind and assumes you know how

React to this headline:

Loading spinner

Review: Cybersecurity For Dummies, 3rd Edition Read More »

Review: Resilient Cybersecurity

Review: Resilient Cybersecurity 2025-05-13 at 08:01 By Mirko Zorz Resilient Cybersecurity touches on nearly every major function of enterprise cybersecurity, from threat detection and identity management to vendor risk and regulatory compliance. About the author Mark Dunkerley is a cybersecurity and technology leader with over 20 years of experience working in higher education, healthcare and

React to this headline:

Loading spinner

Review: Resilient Cybersecurity Read More »

How to give better cybersecurity presentations (without sounding like a robot)

How to give better cybersecurity presentations (without sounding like a robot) 2025-05-12 at 08:35 By Mirko Zorz Most people think great presenters are born with natural talent. Luka Krejci, a presentation expert, disagrees. “They are called presentation skills. Skills, not talent,” he says. “Any skill, be it dancing, football, or presenting, can be developed only

React to this headline:

Loading spinner

How to give better cybersecurity presentations (without sounding like a robot) Read More »

Review: Effective Vulnerability Management

Review: Effective Vulnerability Management 2025-05-05 at 08:03 By Mirko Zorz Effective Vulnerability Management offers a view of a key part of cybersecurity, showing how practices, tools, and processes can help organizations reduce risk. About the authors Chris Hughes is the President of Aquia, a cybersecurity leader with 20 years of public and private sector experience,

React to this headline:

Loading spinner

Review: Effective Vulnerability Management Read More »

Review: The Ultimate Kali Linux Book, Third Edition

Review: The Ultimate Kali Linux Book, Third Edition 2025-04-10 at 07:31 By Mirko Zorz Packed with real-world scenarios, hands-on techniques, and insights into widely used tools, the third edition of the bestselling Ultimate Kali Linux Book offers a practical path to learning penetration testing with Kali Linux. About the author Glen D. Singh, a seasoned

React to this headline:

Loading spinner

Review: The Ultimate Kali Linux Book, Third Edition Read More »

Scroll to Top