strategy

Why ex-military professionals are a good fit for cybersecurity

Why ex-military professionals are a good fit for cybersecurity 2025-10-20 at 13:19 By Sinisa Markovic After years of working as part of a team, many military veterans look for work that still carries meaning, challenge, and purpose. Cybersecurity offers a new way to serve and protect on a different battlefield. Earlier this year, the Department

React to this headline:

Loading spinner

Why ex-military professionals are a good fit for cybersecurity Read More »

Why cybersecurity hiring feels so hard right now

Why cybersecurity hiring feels so hard right now 2025-10-20 at 07:30 By Help Net Security In this Help Net Security video, Carol Lee Hobson, CISO at PayNearMe, explores the realities behind the so-called cybersecurity “talent gap.” She explains why the issue is as much about hiring practices as it is about skills shortages, and offers

React to this headline:

Loading spinner

Why cybersecurity hiring feels so hard right now Read More »

Identifying risky candidates: Practical steps for security leaders

Identifying risky candidates: Practical steps for security leaders 2025-10-16 at 08:32 By Help Net Security Effective insider threat defense begins with candidate vetting. Background checks and reference calls can confirm elements of an applicant’s history, but they rarely surface the deeper risks that can turn into costly problems down the line. Identity verification, credential validation,

React to this headline:

Loading spinner

Identifying risky candidates: Practical steps for security leaders Read More »

The solar power boom opened a backdoor for cybercriminals

The solar power boom opened a backdoor for cybercriminals 2025-10-14 at 11:49 By Sinisa Markovic Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service and undermining confidence in the transition. Cyber threats expose weak spots in solar power systems Until recently, security risks in

React to this headline:

Loading spinner

The solar power boom opened a backdoor for cybercriminals Read More »

Building a healthcare cybersecurity strategy that works

Building a healthcare cybersecurity strategy that works 2025-10-13 at 09:41 By Mirko Zorz In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He explains how focusing on areas like vulnerability management and network segmentation can make the biggest difference. Cummings

React to this headline:

Loading spinner

Building a healthcare cybersecurity strategy that works Read More »

AI-generated images have a problem of credibility, not creativity

AI-generated images have a problem of credibility, not creativity 2025-10-13 at 08:34 By Sinisa Markovic GenAI simplifies image creation, yet it creates hard problems around intellectual property, authenticity, and accountability. Researchers at Queen’s University in Canada examined watermarking as a way to tag AI images so origin and integrity can be checked. Watermarking scenario overview

React to this headline:

Loading spinner

AI-generated images have a problem of credibility, not creativity Read More »

From theory to training: Lessons in making NICE usable

From theory to training: Lessons in making NICE usable 2025-10-10 at 09:02 By Mirko Zorz SMBs may not have big budgets, but they are on the receiving end of many cyberattacks. A new study from Cleveland State University looked at how these companies could train staff without getting lost in the thousands of skills and

React to this headline:

Loading spinner

From theory to training: Lessons in making NICE usable Read More »

Behind the screens: Building security customers appreciate

Behind the screens: Building security customers appreciate 2025-10-09 at 08:03 By Mirko Zorz In this Help Net Security interview, Jess Vachon, CISO at PRA Group, discusses the company’s multi-layered defense against fraud and its commitment to protecting customer trust. Vachon explains how PRA Group balances identity verification with a seamless customer experience. Vachon also reflects

React to this headline:

Loading spinner

Behind the screens: Building security customers appreciate Read More »

How to get better results from bug bounty programs without wasting money

How to get better results from bug bounty programs without wasting money 2025-10-07 at 14:03 By Mirko Zorz The wrong bug bounty strategy can flood your team with low-value reports. The right one can surface critical vulnerabilities that would otherwise slip through. A new academic study based on Google’s Vulnerability Rewards Program (VRP) offers rare

React to this headline:

Loading spinner

How to get better results from bug bounty programs without wasting money Read More »

How to succeed at cybersecurity job interviews

How to succeed at cybersecurity job interviews 2025-10-06 at 09:06 By Sinisa Markovic Imagine this: you’ve made it through the résumé screen, your skills look solid on paper, and now it’s interview day. The next hour will decide whether you move forward or go back to the job boards. What separates the candidates who land

React to this headline:

Loading spinner

How to succeed at cybersecurity job interviews Read More »

When loading a model means loading an attacker

When loading a model means loading an attacker 2025-10-03 at 10:15 By Sinisa Markovic You probably think twice before downloading a random app or opening an unfamiliar email attachment. But how often do you stop to consider what happens when your team downloads and loads a machine learning model? A recent study shows why you

React to this headline:

Loading spinner

When loading a model means loading an attacker Read More »

Building a mature automotive cybersecurity program beyond checklists

Building a mature automotive cybersecurity program beyond checklists 2025-10-02 at 09:41 By Mirko Zorz In this Help Net Security interview, Robert Sullivan, CIO & CISO at Agero, shares his perspective on automotive cybersecurity. He discusses strategies for developing mature security programs, meeting regulatory requirements, and addressing supply chain risks. Sullivan also looks ahead to how

React to this headline:

Loading spinner

Building a mature automotive cybersecurity program beyond checklists Read More »

Underwriting is shifting to AI-driven, real-time decisions by 2030

Underwriting is shifting to AI-driven, real-time decisions by 2030 2025-10-02 at 07:45 By Anamarija Pogorelec Underwriting is undergoing a major transformation as financial institutions push for faster decisions, better fraud detection, and greater personalization, according to a new global Experian report. By 2030, credit decisions are expected to become embedded in everyday transactions, with artificial

React to this headline:

Loading spinner

Underwriting is shifting to AI-driven, real-time decisions by 2030 Read More »

How to stop a single vendor breach from taking down your business

How to stop a single vendor breach from taking down your business 2025-10-01 at 07:38 By Help Net Security In this Help Net Security video, William Dixon, Senior Executive at Intel 471, examines the future of third-party cyber risk and why it is a growing concern for organizations worldwide. As businesses become more interconnected, the

React to this headline:

Loading spinner

How to stop a single vendor breach from taking down your business Read More »

Cyber risk quantification helps CISOs secure executive support

Cyber risk quantification helps CISOs secure executive support 2025-09-30 at 08:44 By Mirko Zorz In this Help Net Security interview, Vivien Bilquez, Global Head of Cyber Resilience at Zurich Resilience Solutions, discusses how organizations are rethinking cyber resilience. He talks about the priorities CISOs should focus on and the risks that are often overlooked. Bilquez

React to this headline:

Loading spinner

Cyber risk quantification helps CISOs secure executive support Read More »

The CISO’s guide to stronger board communication

The CISO’s guide to stronger board communication 2025-09-29 at 08:04 By Help Net Security In this Help Net Security video, Alisdair Faulkner, CEO of Darwinium, explores how the role of the CISO has changed over the past decade. Faulkner shares insights on how CISOs can communicate with the board, overcome common pitfalls such as overly

React to this headline:

Loading spinner

The CISO’s guide to stronger board communication Read More »

The fight to lock down drones and their supply chains

The fight to lock down drones and their supply chains 2025-09-25 at 10:12 By Sinisa Markovic Drones have already shown their impact in military operations, and their influence is spreading across the agricultural and industrial sectors. Given their technological capabilities, we need to be aware of the risks they bring. Drones as a new attack

React to this headline:

Loading spinner

The fight to lock down drones and their supply chains Read More »

Building a stronger SOC through AI augmentation

Building a stronger SOC through AI augmentation 2025-09-24 at 09:22 By Mirko Zorz In this Help Net Security interview, Tim Bramble, Director of Threat Detection and Response at OpenText, discusses how SOC teams are gaining value from AI in detecting and prioritizing threats. By learning what “normal” looks like across users and systems, AI helps

React to this headline:

Loading spinner

Building a stronger SOC through AI augmentation Read More »

Building AI responsibly from day one

Building AI responsibly from day one 2025-09-24 at 07:45 By Help Net Security In this Help Net Security video, David Hardoon, Global Head of AI Enablement at Standard Chartered, discusses the role of ethics and safety in AI development. He explains why principles like fairness, accountability, and transparency must be built into AI systems from

React to this headline:

Loading spinner

Building AI responsibly from day one Read More »

Scroll to Top