Video

Kubernetes has grown up: From testbed to critical infrastructure

Kubernetes has grown up: From testbed to critical infrastructure 2025-05-15 at 08:02 By Help Net Security In this Help Net Security video, Divya Mohan, Principal Technology Advocate at SUSE, discusses how Kubernetes has firmly transitioned from an emerging technology into a core part of enterprise production environments. A new survey from SUSE highlights the latest […]

React to this headline:

Loading spinner

Kubernetes has grown up: From testbed to critical infrastructure Read More »

Layoffs pose a cybersecurity risk: Here’s why offboarding matters

Layoffs pose a cybersecurity risk: Here’s why offboarding matters 2025-05-12 at 07:39 By Help Net Security In this Help Net Security video, Chase Doelling, Principal Strategist at JumpCloud, discusses the overlooked security risks associated with improper offboarding. Though many organizations focus on securely onboarding new employees, they often overlook the security risks associated with properly

React to this headline:

Loading spinner

Layoffs pose a cybersecurity risk: Here’s why offboarding matters Read More »

Key tips to stay safe from deepfake and AI threats

Key tips to stay safe from deepfake and AI threats 2025-05-06 at 07:31 By Help Net Security In this Help Net Security video, Joshua McKenty, CEO of Polyguard, talks about how to protect yourself from deepfake and AI threats, which are getting harder to spot and easier to launch. Attackers can clone your voice or

React to this headline:

Loading spinner

Key tips to stay safe from deepfake and AI threats Read More »

Online fraud peaks as breaches rise

Online fraud peaks as breaches rise 2025-05-01 at 07:31 By Help Net Security Data breaches played a key role in significant financial losses faced by consumers due to fraud. In this Help Net Security video, Steve Yin, Global Head of Fraud at TransUnion, and Brad Daughdrill, VP, Data Science, Head of Global Fraud Analytics, TransUnion,

React to this headline:

Loading spinner

Online fraud peaks as breaches rise Read More »

Inside PlugValley: How this AI vishing-as-a-service group operates

Inside PlugValley: How this AI vishing-as-a-service group operates 2025-04-17 at 07:41 By Help Net Security In this Help Net Security video, Alexis Ober, Threat Intel Analyst at Fortra, discusses the threat actor group PlugValley, which is now offering AI-powered vishing-as-a-service. Rather than requiring technical skills or large budgets, PlugValley’s service lets any cybercriminal launch vishing

React to this headline:

Loading spinner

Inside PlugValley: How this AI vishing-as-a-service group operates Read More »

Chief Legal Officers step up in cybersecurity oversight

Chief Legal Officers step up in cybersecurity oversight 2025-04-15 at 07:42 By Help Net Security In this Help Net Security video, Jennifer Chen, Executive Director of the Association of Corporate Counsel (ACC) Foundation, discusses how globally, Chief Legal Officers (CLOs) are becoming integral leaders in cybersecurity strategy, holding leadership positions, and frequently reporting cybersecurity strategies

React to this headline:

Loading spinner

Chief Legal Officers step up in cybersecurity oversight Read More »

The rise of compromised LLM attacks

The rise of compromised LLM attacks 2025-04-07 at 07:03 By Help Net Security In this Help Net Security video, Sohrob Kazerounian, Distinguished AI Researcher at Vectra AI, discusses how the ongoing rapid adoption of LLM-based applications has already introduced new cybersecurity risks. These vulnerabilities will not be in the LLM itself, but rather in how

React to this headline:

Loading spinner

The rise of compromised LLM attacks Read More »

Inside the AI-driven threat landscape

Inside the AI-driven threat landscape 2025-04-04 at 07:35 By Help Net Security In this Help Net Security video, Nick Barter, Chief Strategy Officer at Nothreat, discusses how AI is no longer just a tool for defenders, it’s now a powerful weapon in the hands of attackers. With the adoption of generative AI, cyber threats are

React to this headline:

Loading spinner

Inside the AI-driven threat landscape Read More »

Post-quantum cryptography and the future of online safety

Post-quantum cryptography and the future of online safety 2025-03-28 at 07:04 By Help Net Security In this Help Net Security video, Rebecca Krauthamer, CEO of QuSecure, explores the rising urgency of post-quantum cryptography (PQC) and what organizations must do to prepare. She breaks down the so-called “quantum threat” and explains why it’s not just theoretical.

React to this headline:

Loading spinner

Post-quantum cryptography and the future of online safety Read More »

How AI agents could undermine computing infrastructure security

How AI agents could undermine computing infrastructure security 2025-03-25 at 07:34 By Help Net Security In this Help Net Security video, Ev Kontsevoy, CEO at Teleport, explores the risks AI agents pose to computing infrastructure, particularly when exposed to social engineering attacks. Unlike traditional software, AI agents aren’t fully deterministic, making them more vulnerable to

React to this headline:

Loading spinner

How AI agents could undermine computing infrastructure security Read More »

Pay, fight, or stall? The dilemma of ransomware negotiations

Pay, fight, or stall? The dilemma of ransomware negotiations 2025-03-17 at 08:02 By Help Net Security Ransomware negotiations are a high-stakes game where every decision matters. In this Help Net Security video, Kurtis Minder, CEO at GroupSense, takes us inside the world of ransomware negotiations. We learn how attackers communicate, the tough decisions victims face,

React to this headline:

Loading spinner

Pay, fight, or stall? The dilemma of ransomware negotiations Read More »

Defending against EDR bypass attacks

Defending against EDR bypass attacks 2025-03-12 at 07:06 By Help Net Security EDR bypass and killer attacks are surging, yet many organizations continue to overlook this threat while they have become over-reliant on this security tool – particularly when preventing ransomware. In this Help Net Security video, John Dwyer, Director of Security Research at Binary

React to this headline:

Loading spinner

Defending against EDR bypass attacks Read More »

Who’s in your digital house? The truth about third-party access

Who’s in your digital house? The truth about third-party access 2025-03-10 at 07:01 By Help Net Security In this Help Net Security video, Fran Rosch, CEO at Imprivata, discusses organizations’ challenges in securing third-party access and offers valuable insights on how businesses can address these risks effectively. A recent report conducted by the Ponemon Institute,

React to this headline:

Loading spinner

Who’s in your digital house? The truth about third-party access Read More »

AI threats and workforce shortages put pressure on security leaders

AI threats and workforce shortages put pressure on security leaders 2025-03-07 at 07:30 By Help Net Security In this Help Net Security video, John Grancarich, Fortra’s Chief Strategy Officer, discusses the 2025 Fortra State of Cybersecurity Survey and highlights escalating concerns among security professionals about AI-driven threats and a shortage of cybersecurity skills. The survey

React to this headline:

Loading spinner

AI threats and workforce shortages put pressure on security leaders Read More »

Scammers take over social media

Scammers take over social media 2025-03-05 at 07:02 By Help Net Security In Q4 2024, cyber threats reached unprecedented levels, with 2.55 billion attacks blocked, equating to 321 threats every second. In this Help Net Security video, Luis Corrons, Security Evangelist at Gen, discusses a new Gen report that highlights a troubling trend: social media

React to this headline:

Loading spinner

Scammers take over social media Read More »

Why a push for encryption backdoors is a global security risk

Why a push for encryption backdoors is a global security risk 2025-03-04 at 07:36 By Help Net Security Governments in the UK, US, and Europe are pressuring tech companies to weaken encryption in the name of security. The latest push from the UK government demanding Apple create a backdoor to encrypted iCloud data is just

React to this headline:

Loading spinner

Why a push for encryption backdoors is a global security risk Read More »

Innovation vs. security: Managing shadow AI risks

Innovation vs. security: Managing shadow AI risks 2025-03-03 at 18:02 By Help Net Security In this Help Net Security video, Tim Morris, Chief Security Advisor at Tanium, shares practical best practices to help organizations balance innovation and security while leveraging AI. Morris warns of an even riskier shadow AI trend in which departments, unsatisfied with

React to this headline:

Loading spinner

Innovation vs. security: Managing shadow AI risks Read More »

The art of balancing data security with business goals

The art of balancing data security with business goals 2025-02-28 at 07:32 By Help Net Security In this Help Net Security video, Nathan Parks, Senior Research Specialist at Gartner, discusses their recent research, revealing that only 14% of security leaders effectively balance data security with business goals. 35% of leaders are focused on securing data,

React to this headline:

Loading spinner

The art of balancing data security with business goals Read More »

How enterprise leaders can secure and govern agentic AI

How enterprise leaders can secure and govern agentic AI 2025-02-26 at 08:20 By Help Net Security In this Help Net Security video, Nataraj Nagaratnam, an IBM Fellow and CTO for Cloud Security, discusses enterprises’ steps to lay a secure foundation for agentic AI deployments. Recent research from IBM and Morning Consult shows that 99% of

React to this headline:

Loading spinner

How enterprise leaders can secure and govern agentic AI Read More »

Why AI deployment requires a new level of governance

Why AI deployment requires a new level of governance 2025-02-24 at 07:09 By Help Net Security In this Help Net Security video, Lee Waskevich, VP of Security at ePlus, discusses how AI deployment demands enhanced governance and stricter controls, particularly in managing data. The recent ePlus AI Readiness survey revealed that the top data concerns

React to this headline:

Loading spinner

Why AI deployment requires a new level of governance Read More »

Scroll to Top