Video

Why neglected assets are the hidden threat attackers love to find

Why neglected assets are the hidden threat attackers love to find 2025-09-15 at 07:58 By Help Net Security In this Help Net Security video, Tim Chase, Tech Evangelist at Orca Security, explores one of the most overlooked cybersecurity risks: neglected assets. From forgotten cloud resources and outdated OT systems to expired domains and abandoned storage, […]

React to this headline:

Loading spinner

Why neglected assets are the hidden threat attackers love to find Read More »

The state of DMARC adoption: What 10M domains reveal

The state of DMARC adoption: What 10M domains reveal 2025-09-11 at 07:43 By Help Net Security In this Help Net Security video, John Wilson, Senior Fellow, Threat Research at Fortra, explores the state of DMARC adoption across the top 10 million internet domains. He explains how SPF, DKIM, and DMARC work together to prevent email

React to this headline:

Loading spinner

The state of DMARC adoption: What 10M domains reveal Read More »

Are we headed for an AI culture war?

Are we headed for an AI culture war? 2025-09-09 at 07:52 By Help Net Security In this Help Net Security video, Matt Fangman, Field CTO at SailPoint, discusses whether an AI culture war is inevitable. He explores the rise of AI agents as a new identity type, the need for guardrails and human supervision, and

React to this headline:

Loading spinner

Are we headed for an AI culture war? Read More »

Smart ways CISOs can do more with less

Smart ways CISOs can do more with less 2025-09-05 at 08:05 By Help Net Security In this Help Net Security video, Jill Knesek, CISO at BlackLine, shares practical strategies for CISOs navigating tighter budgets. From maximizing existing tools and vendor partnerships to leveraging AI and making smart investments, she offers actionable advice for maintaining strong

React to this headline:

Loading spinner

Smart ways CISOs can do more with less Read More »

CyberFlex: Flexible Pen testing as a Service with EASM

CyberFlex: Flexible Pen testing as a Service with EASM 2025-09-04 at 16:58 By Help Net Security About CyberFlex CyberFlex is an Outpost24 solution that combines the strengths of its Pen-testing-as-a-Service (PTaaS) and External Attack Surface Management (EASM) solutions. Customers benefit from continuous coverage of their entire attack application attack surface, while enjoying a flexible consumption model.

React to this headline:

Loading spinner

CyberFlex: Flexible Pen testing as a Service with EASM Read More »

Five habits of highly secure development teams

Five habits of highly secure development teams 2025-09-03 at 07:46 By Help Net Security In this Help Net Security video, Brendon Collins, Principal Consultant at Optiv, explores how organizations can embed security and privacy into the software development lifecycle (SDLC) from the very start. He outlines five proactive principles, including default-deny architecture, privacy in the

React to this headline:

Loading spinner

Five habits of highly secure development teams Read More »

What the GitGuardian secrets sprawl report reveals about leaked credentials

What the GitGuardian secrets sprawl report reveals about leaked credentials 2025-09-02 at 07:47 By Help Net Security In this Help Net Security video, Dwayne McDaniel, Senior Developer Advocate at GitGuardian, presents findings from The State of Secrets Sprawl 2025. McDaniel explains why generic secrets are especially difficult to detect, why private repositories pose an even

React to this headline:

Loading spinner

What the GitGuardian secrets sprawl report reveals about leaked credentials Read More »

AI isn’t taking over the world, but here’s what you should worry about

AI isn’t taking over the world, but here’s what you should worry about 2025-08-29 at 10:03 By Help Net Security In this Help Net Security video, Josh Meier, Senior Generative AI Author at Pluralsight, debunks the myth that AI could “escape” servers or act on its own. He explains how large language models actually work,

React to this headline:

Loading spinner

AI isn’t taking over the world, but here’s what you should worry about Read More »

How to build a secure AI culture without shutting people down

How to build a secure AI culture without shutting people down 2025-08-26 at 07:32 By Help Net Security In this Help Net Security video, Michael Burch, Director of Application Security at Security Journey, explains how organizations can build a secure AI culture. He highlights the risks of banning AI outright, the dangers of shadow AI,

React to this headline:

Loading spinner

How to build a secure AI culture without shutting people down Read More »

DevOps in the cloud and what is putting your data at risk

DevOps in the cloud and what is putting your data at risk 2025-08-22 at 07:33 By Help Net Security In this Help Net Security video, Greg Bak, Head of Product Enablement at GitProtect, walks through some of the biggest security risks DevOps teams are dealing with. He covers how AI tools can introduce vulnerabilities, including

React to this headline:

Loading spinner

DevOps in the cloud and what is putting your data at risk Read More »

What makes airport and airline systems so vulnerable to attack?

What makes airport and airline systems so vulnerable to attack? 2025-08-19 at 07:32 By Help Net Security In this Help Net Security video, Recep Ozdag, VP and GM at Keysight Technologies, explains why airline and airport systems are so difficult to secure. He explores the complex aviation ecosystem, from legacy systems and third-party vendors to

React to this headline:

Loading spinner

What makes airport and airline systems so vulnerable to attack? Read More »

Fighting fraud with AI: The new identity security playbook

Fighting fraud with AI: The new identity security playbook 2025-08-15 at 08:34 By Help Net Security In this Help Net Security video, Hal Lonas, CTO at Trulioo, talks about the rise of synthetic identity fraud and how it’s quickly becoming one of the biggest threats in financial crime. He breaks down how fraudsters are using

React to this headline:

Loading spinner

Fighting fraud with AI: The new identity security playbook Read More »

What makes a security program mature and how to get there faster

What makes a security program mature and how to get there faster 2025-08-12 at 08:31 By Help Net Security Security leaders are flush with tools and data, but it’s not helping their programs mature. In this Help Net Security video, PlexTrac’s Dan DeCloss outlines the 3 key gaps holding security programs back and what sets

React to this headline:

Loading spinner

What makes a security program mature and how to get there faster Read More »

Third-party partners or ticking time bombs?

Third-party partners or ticking time bombs? 2025-08-08 at 08:46 By Help Net Security In this Help Net Security video, Ngaire Elizabeth Guzzetti, Technical Director Supply Chain at CyXcel, discusses why a third of U.S. organizations don’t trust third-party vendors to manage critical risks and what that means for supply chain security. She breaks down the

React to this headline:

Loading spinner

Third-party partners or ticking time bombs? Read More »

AI in the SOC: Game-changer or more noise?

AI in the SOC: Game-changer or more noise? 2025-08-06 at 08:02 By Help Net Security In this Help Net Security video, Kev Marriott, Senior Manager of Cyber at Immersive Labs, explores the challenges and opportunities of integrating AI into Security Operations Centers (SOCs). While AI can boost productivity by automating manual tasks and reducing alert

React to this headline:

Loading spinner

AI in the SOC: Game-changer or more noise? Read More »

What attackers know about your company thanks to AI

What attackers know about your company thanks to AI 2025-08-01 at 08:48 By Help Net Security In this Help Net Security video, Tom Cross, Head of Threat Research at GetReal Security, explores how generative AI is empowering threat actors. He breaks down three key areas: how GenAI lowers the technical barrier for attackers, enables highly

React to this headline:

Loading spinner

What attackers know about your company thanks to AI Read More »

How to fight document fraud with the latest tech tools

How to fight document fraud with the latest tech tools 2025-07-28 at 07:07 By Help Net Security In this Help Net Security video, Thomas Berndorfer, CEO of Connecting Software, explores cutting-edge technologies designed to detect and prevent document forgery and digital fraud. He presents four key approaches to verifying document authenticity: IDVT, PKI, AI-based methods,

React to this headline:

Loading spinner

How to fight document fraud with the latest tech tools Read More »

What the law says about your next data breach

What the law says about your next data breach 2025-07-22 at 10:13 By Help Net Security In this Help Net Security video, Chad Humphries, Solution Consultant, Networks & Cyber Security at Rockwell Automation, explores how cyber risk quantification is becoming essential for modern organizations. He breaks down global legal frameworks, AI’s growing role in dispute

React to this headline:

Loading spinner

What the law says about your next data breach Read More »

Why silent authentication is the smarter way to secure BYOD

Why silent authentication is the smarter way to secure BYOD 2025-07-17 at 09:08 By Help Net Security In this Help Net Security video, Andy Ulrich, CISO at Vonage, explains how silent authentication offers a smarter, seamless solution to the security and productivity challenges of BYOD. He breaks down how it works, why it matters, and

React to this headline:

Loading spinner

Why silent authentication is the smarter way to secure BYOD Read More »

Bitdefender PHASR: Proactive hardening demo overview

Bitdefender PHASR: Proactive hardening demo overview 2025-07-14 at 08:35 By Help Net Security Discover how Bitdefender PHASR enables organizations to identify and remediate security misconfigurations before attackers can exploit them. This demo walks through PHASR’s proactive hardening capabilities, showing how it transforms visibility into actionable protection. The post Bitdefender PHASR: Proactive hardening demo overview appeared

React to this headline:

Loading spinner

Bitdefender PHASR: Proactive hardening demo overview Read More »

Scroll to Top