strategy

Fighting fraud with AI: The new identity security playbook

Fighting fraud with AI: The new identity security playbook 2025-08-15 at 08:34 By Help Net Security In this Help Net Security video, Hal Lonas, CTO at Trulioo, talks about the rise of synthetic identity fraud and how it’s quickly becoming one of the biggest threats in financial crime. He breaks down how fraudsters are using […]

React to this headline:

Loading spinner

Fighting fraud with AI: The new identity security playbook Read More »

AI security governance converts disorder into deliberate innovation

AI security governance converts disorder into deliberate innovation 2025-08-14 at 09:16 By Help Net Security AI security governance provides a stable compass, channeling efforts and transforming AI from an experimental tool to a reliable, enterprise-class solution. With adequate governance built at the center of AI efforts, business leaders can shape AI plans with intention, while

React to this headline:

Loading spinner

AI security governance converts disorder into deliberate innovation Read More »

AWS CISO explains how cloud-native security scales with your business

AWS CISO explains how cloud-native security scales with your business 2025-08-13 at 09:01 By Mirko Zorz In this Help Net Security interview, Amy Herzog, CISO at AWS, discusses how cloud-native security enables scalable, flexible protection that aligns with how teams build in the cloud. She explains the Shared Responsibility Model and the tools and processes

React to this headline:

Loading spinner

AWS CISO explains how cloud-native security scales with your business Read More »

APT groups are getting personal, and CISOs should be concerned

APT groups are getting personal, and CISOs should be concerned 2025-08-12 at 14:42 By Mirko Zorz Instead of focusing only on corporate systems, some APT groups are now going after executives in their personal lives. Home networks, private devices, and even family members have become targets. This approach works because executives often work remotely, store

React to this headline:

Loading spinner

APT groups are getting personal, and CISOs should be concerned Read More »

What makes a security program mature and how to get there faster

What makes a security program mature and how to get there faster 2025-08-12 at 08:31 By Help Net Security Security leaders are flush with tools and data, but it’s not helping their programs mature. In this Help Net Security video, PlexTrac’s Dan DeCloss outlines the 3 key gaps holding security programs back and what sets

React to this headline:

Loading spinner

What makes a security program mature and how to get there faster Read More »

From legacy to SaaS: Why complexity is the enemy of enterprise security

From legacy to SaaS: Why complexity is the enemy of enterprise security 2025-08-11 at 08:32 By Mirko Zorz In this Help Net Security interview, Robert Buljevic, Technology Consultant at Bridge IT, discusses how the coexistence of legacy systems and SaaS applications is changing the way organizations approach security. He explains why finding the right balance

React to this headline:

Loading spinner

From legacy to SaaS: Why complexity is the enemy of enterprise security Read More »

Review: From Day Zero to Zero Day

Review: From Day Zero to Zero Day 2025-08-11 at 08:02 By Mirko Zorz From Day Zero to Zero Day is a practical guide for cybersecurity pros who want to move beyond reading about vulnerabilities and start finding them. It gives a methodical look at how real vulnerability research is done. About the author Eugene Lim

React to this headline:

Loading spinner

Review: From Day Zero to Zero Day Read More »

Third-party partners or ticking time bombs?

Third-party partners or ticking time bombs? 2025-08-08 at 08:46 By Help Net Security In this Help Net Security video, Ngaire Elizabeth Guzzetti, Technical Director Supply Chain at CyXcel, discusses why a third of U.S. organizations don’t trust third-party vendors to manage critical risks and what that means for supply chain security. She breaks down the

React to this headline:

Loading spinner

Third-party partners or ticking time bombs? Read More »

Security tooling pitfalls for small teams: Cost, complexity, and low ROI

Security tooling pitfalls for small teams: Cost, complexity, and low ROI 2025-08-05 at 10:11 By Mirko Zorz In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large enterprises don’t work well for leaner, cloud-native teams. He explains how simplicity, integration, and automation are key for

React to this headline:

Loading spinner

Security tooling pitfalls for small teams: Cost, complexity, and low ROI Read More »

AIBOMs are the new SBOMs: The missing link in AI risk management

AIBOMs are the new SBOMs: The missing link in AI risk management 2025-08-04 at 09:11 By Mirko Zorz In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training data and shadow AI, can lead to security issues that conventional tools fail to detect. He explains

React to this headline:

Loading spinner

AIBOMs are the new SBOMs: The missing link in AI risk management Read More »

Smart steps to keep your AI future-ready

Smart steps to keep your AI future-ready 2025-08-01 at 09:36 By Mirko Zorz In this Help Net Security interview, Rohan Sen, Principal, Cyber, Data, and Tech Risk, PwC US, discusses how organizations can design autonomous AI agents with strong governance from day one. As AI becomes more embedded in business ecosystems, overlooking agent-level security can

React to this headline:

Loading spinner

Smart steps to keep your AI future-ready Read More »

It’s time to sound the alarm on water sector cybersecurity

It’s time to sound the alarm on water sector cybersecurity 2025-08-01 at 09:07 By Sinisa Markovic A cyberattack on a water facility can put entire communities and businesses at risk. Even a short disruption in clean water supply can have serious public health and safety consequences, and threat actors know the damage they can cause.

React to this headline:

Loading spinner

It’s time to sound the alarm on water sector cybersecurity Read More »

AI is changing the vCISO game

AI is changing the vCISO game 2025-07-31 at 08:02 By Anamarija Pogorelec Virtual CISO (vCISO) services have moved from niche to mainstream, with vCISO services adoption 2025 data showing a more than threefold increase in just one year. According to Cynomi’s 2025 State of the Virtual CISO report, 67% of MSPs and MSSPs now offer

React to this headline:

Loading spinner

AI is changing the vCISO game Read More »

The food supply chain has a cybersecurity problem

The food supply chain has a cybersecurity problem 2025-07-30 at 08:30 By Sinisa Markovic It’s unsettling to think that our food supply chain could be targeted or that the safety of our food could be compromised. But this is exactly the challenge the agri-food sector is dealing with right now. Despite agriculture’s importance, cybersecurity in

React to this headline:

Loading spinner

The food supply chain has a cybersecurity problem Read More »

Why CISOs should rethink identity risk through attack paths

Why CISOs should rethink identity risk through attack paths 2025-07-30 at 08:00 By Sinisa Markovic Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report from SpecterOps makes the case that traditional tools like identity governance, PAM, and MFA

React to this headline:

Loading spinner

Why CISOs should rethink identity risk through attack paths Read More »

Boards shift focus to tech and navigate cautious investors

Boards shift focus to tech and navigate cautious investors 2025-07-30 at 07:00 By Anamarija Pogorelec Corporate boards are adjusting to a more uncertain proxy landscape, according to EY’s 2025 Proxy Season Review. The report highlights four key 2025 proxy season trends shaping governance this year: more oversight of technology, fewer shareholder proposals (especially on sustainability),

React to this headline:

Loading spinner

Boards shift focus to tech and navigate cautious investors Read More »

Fighting AI with AI: How Darwinium is reshaping fraud defense

Fighting AI with AI: How Darwinium is reshaping fraud defense 2025-07-29 at 16:07 By Mirko Zorz AI agents are showing up in more parts of the customer journey, from product discovery to checkout. And fraudsters are also putting them to work, often with alarming success. In response, cyberfraud prevention leader Darwinium is launching two AI-powered

React to this headline:

Loading spinner

Fighting AI with AI: How Darwinium is reshaping fraud defense Read More »

Ransomware will thrive until we change our strategy

Ransomware will thrive until we change our strategy 2025-07-29 at 08:36 By Help Net Security We have reached a stage where ransomware isn’t simply a cybercrime issue: it is now clearly a business disruptor, a threat to societal trust, and increasingly, a national security crisis. As James Babbage, Director General (Threats) at the UK’s National

React to this headline:

Loading spinner

Ransomware will thrive until we change our strategy Read More »

The final frontier of cybersecurity is now in space

The final frontier of cybersecurity is now in space 2025-07-29 at 08:11 By Sinisa Markovic As the space sector becomes more commercial and military-focused, these assets are becoming attractive targets. The global space economy is booming and is expected to increase from $630 billion in 2023 to $1.8 trillion by 2035. This means the need

React to this headline:

Loading spinner

The final frontier of cybersecurity is now in space Read More »

Your supply chain security strategy might be missing the biggest risk

Your supply chain security strategy might be missing the biggest risk 2025-07-28 at 09:03 By Help Net Security Third-party involvement in data breaches has doubled this year from 15 percent to nearly 30 percent. In response, many organizations have sharpened their focus on third-party risk management, carefully vetting the security practices of their vendors. However,

React to this headline:

Loading spinner

Your supply chain security strategy might be missing the biggest risk Read More »

Scroll to Top