Video

Turning the human factor into your strongest cybersecurity defense

Turning the human factor into your strongest cybersecurity defense 2025-10-09 at 07:30 By Help Net Security In this Help Net Security video, Jacob Martens, Field CISO at Upwind Security, explores one of cybersecurity’s most enduring challenges: the human factor behind breaches. Despite advances in technology, most attacks still begin with people, not code. He explains […]

React to this headline:

Loading spinner

Turning the human factor into your strongest cybersecurity defense Read More »

How to stop a single vendor breach from taking down your business

How to stop a single vendor breach from taking down your business 2025-10-01 at 07:38 By Help Net Security In this Help Net Security video, William Dixon, Senior Executive at Intel 471, examines the future of third-party cyber risk and why it is a growing concern for organizations worldwide. As businesses become more interconnected, the

React to this headline:

Loading spinner

How to stop a single vendor breach from taking down your business Read More »

The CISO’s guide to stronger board communication

The CISO’s guide to stronger board communication 2025-09-29 at 08:04 By Help Net Security In this Help Net Security video, Alisdair Faulkner, CEO of Darwinium, explores how the role of the CISO has changed over the past decade. Faulkner shares insights on how CISOs can communicate with the board, overcome common pitfalls such as overly

React to this headline:

Loading spinner

The CISO’s guide to stronger board communication Read More »

How agentic AI is changing the SOC

How agentic AI is changing the SOC 2025-09-26 at 07:48 By Help Net Security In this Help Net Security video, David Norlin, CTO of Lumifi, explores the role of agentic AI in the security operations center (SOC). He explains what agentic AI is, how it can enhance cybersecurity workflows by automating repetitive tasks, and why

React to this headline:

Loading spinner

How agentic AI is changing the SOC Read More »

Building AI responsibly from day one

Building AI responsibly from day one 2025-09-24 at 07:45 By Help Net Security In this Help Net Security video, David Hardoon, Global Head of AI Enablement at Standard Chartered, discusses the role of ethics and safety in AI development. He explains why principles like fairness, accountability, and transparency must be built into AI systems from

React to this headline:

Loading spinner

Building AI responsibly from day one Read More »

AI needs ethics to avoid real-world harm

AI needs ethics to avoid real-world harm 2025-09-22 at 08:09 By Help Net Security In this Help Net Security video, Brittany Allen, Senior Trust and Safety Architect at Sift, explores how the rise of AI agents is creating new fraud risks. She explains how these agents, while designed to assist users, can unintentionally help fraudsters

React to this headline:

Loading spinner

AI needs ethics to avoid real-world harm Read More »

The real-world effects of EU’s DORA regulation on global businesses

The real-world effects of EU’s DORA regulation on global businesses 2025-09-19 at 08:31 By Help Net Security In this Help Net Security video, Matt Cooper, Director of Governance, Risk, and Compliance at Vanta, discusses the EU’s Digital Operational Resilience Act (DORA) and its effects six months after it went into effect. DORA is the first

React to this headline:

Loading spinner

The real-world effects of EU’s DORA regulation on global businesses Read More »

Bots vs. humans? Why intent is the game-changer

Bots vs. humans? Why intent is the game-changer 2025-09-17 at 07:30 By Help Net Security In this Help Net Security video, Jérôme Segura, VP of Threat Research at Datadome, explains why intent, not just identifying bots, must be the new focus for cybersecurity teams. He explores how advanced AI agents and sophisticated bots blur the

React to this headline:

Loading spinner

Bots vs. humans? Why intent is the game-changer Read More »

Why neglected assets are the hidden threat attackers love to find

Why neglected assets are the hidden threat attackers love to find 2025-09-15 at 07:58 By Help Net Security In this Help Net Security video, Tim Chase, Tech Evangelist at Orca Security, explores one of the most overlooked cybersecurity risks: neglected assets. From forgotten cloud resources and outdated OT systems to expired domains and abandoned storage,

React to this headline:

Loading spinner

Why neglected assets are the hidden threat attackers love to find Read More »

The state of DMARC adoption: What 10M domains reveal

The state of DMARC adoption: What 10M domains reveal 2025-09-11 at 07:43 By Help Net Security In this Help Net Security video, John Wilson, Senior Fellow, Threat Research at Fortra, explores the state of DMARC adoption across the top 10 million internet domains. He explains how SPF, DKIM, and DMARC work together to prevent email

React to this headline:

Loading spinner

The state of DMARC adoption: What 10M domains reveal Read More »

Are we headed for an AI culture war?

Are we headed for an AI culture war? 2025-09-09 at 07:52 By Help Net Security In this Help Net Security video, Matt Fangman, Field CTO at SailPoint, discusses whether an AI culture war is inevitable. He explores the rise of AI agents as a new identity type, the need for guardrails and human supervision, and

React to this headline:

Loading spinner

Are we headed for an AI culture war? Read More »

Smart ways CISOs can do more with less

Smart ways CISOs can do more with less 2025-09-05 at 08:05 By Help Net Security In this Help Net Security video, Jill Knesek, CISO at BlackLine, shares practical strategies for CISOs navigating tighter budgets. From maximizing existing tools and vendor partnerships to leveraging AI and making smart investments, she offers actionable advice for maintaining strong

React to this headline:

Loading spinner

Smart ways CISOs can do more with less Read More »

CyberFlex: Flexible Pen testing as a Service with EASM

CyberFlex: Flexible Pen testing as a Service with EASM 2025-09-04 at 16:58 By Help Net Security About CyberFlex CyberFlex is an Outpost24 solution that combines the strengths of its Pen-testing-as-a-Service (PTaaS) and External Attack Surface Management (EASM) solutions. Customers benefit from continuous coverage of their entire attack application attack surface, while enjoying a flexible consumption model.

React to this headline:

Loading spinner

CyberFlex: Flexible Pen testing as a Service with EASM Read More »

Five habits of highly secure development teams

Five habits of highly secure development teams 2025-09-03 at 07:46 By Help Net Security In this Help Net Security video, Brendon Collins, Principal Consultant at Optiv, explores how organizations can embed security and privacy into the software development lifecycle (SDLC) from the very start. He outlines five proactive principles, including default-deny architecture, privacy in the

React to this headline:

Loading spinner

Five habits of highly secure development teams Read More »

What the GitGuardian secrets sprawl report reveals about leaked credentials

What the GitGuardian secrets sprawl report reveals about leaked credentials 2025-09-02 at 07:47 By Help Net Security In this Help Net Security video, Dwayne McDaniel, Senior Developer Advocate at GitGuardian, presents findings from The State of Secrets Sprawl 2025. McDaniel explains why generic secrets are especially difficult to detect, why private repositories pose an even

React to this headline:

Loading spinner

What the GitGuardian secrets sprawl report reveals about leaked credentials Read More »

AI isn’t taking over the world, but here’s what you should worry about

AI isn’t taking over the world, but here’s what you should worry about 2025-08-29 at 10:03 By Help Net Security In this Help Net Security video, Josh Meier, Senior Generative AI Author at Pluralsight, debunks the myth that AI could “escape” servers or act on its own. He explains how large language models actually work,

React to this headline:

Loading spinner

AI isn’t taking over the world, but here’s what you should worry about Read More »

How to build a secure AI culture without shutting people down

How to build a secure AI culture without shutting people down 2025-08-26 at 07:32 By Help Net Security In this Help Net Security video, Michael Burch, Director of Application Security at Security Journey, explains how organizations can build a secure AI culture. He highlights the risks of banning AI outright, the dangers of shadow AI,

React to this headline:

Loading spinner

How to build a secure AI culture without shutting people down Read More »

DevOps in the cloud and what is putting your data at risk

DevOps in the cloud and what is putting your data at risk 2025-08-22 at 07:33 By Help Net Security In this Help Net Security video, Greg Bak, Head of Product Enablement at GitProtect, walks through some of the biggest security risks DevOps teams are dealing with. He covers how AI tools can introduce vulnerabilities, including

React to this headline:

Loading spinner

DevOps in the cloud and what is putting your data at risk Read More »

What makes airport and airline systems so vulnerable to attack?

What makes airport and airline systems so vulnerable to attack? 2025-08-19 at 07:32 By Help Net Security In this Help Net Security video, Recep Ozdag, VP and GM at Keysight Technologies, explains why airline and airport systems are so difficult to secure. He explores the complex aviation ecosystem, from legacy systems and third-party vendors to

React to this headline:

Loading spinner

What makes airport and airline systems so vulnerable to attack? Read More »

Fighting fraud with AI: The new identity security playbook

Fighting fraud with AI: The new identity security playbook 2025-08-15 at 08:34 By Help Net Security In this Help Net Security video, Hal Lonas, CTO at Trulioo, talks about the rise of synthetic identity fraud and how it’s quickly becoming one of the biggest threats in financial crime. He breaks down how fraudsters are using

React to this headline:

Loading spinner

Fighting fraud with AI: The new identity security playbook Read More »

Scroll to Top