Video

How AI agents could undermine computing infrastructure security

How AI agents could undermine computing infrastructure security 2025-03-25 at 07:34 By Help Net Security In this Help Net Security video, Ev Kontsevoy, CEO at Teleport, explores the risks AI agents pose to computing infrastructure, particularly when exposed to social engineering attacks. Unlike traditional software, AI agents aren’t fully deterministic, making them more vulnerable to […]

React to this headline:

Loading spinner

How AI agents could undermine computing infrastructure security Read More »

Pay, fight, or stall? The dilemma of ransomware negotiations

Pay, fight, or stall? The dilemma of ransomware negotiations 2025-03-17 at 08:02 By Help Net Security Ransomware negotiations are a high-stakes game where every decision matters. In this Help Net Security video, Kurtis Minder, CEO at GroupSense, takes us inside the world of ransomware negotiations. We learn how attackers communicate, the tough decisions victims face,

React to this headline:

Loading spinner

Pay, fight, or stall? The dilemma of ransomware negotiations Read More »

Defending against EDR bypass attacks

Defending against EDR bypass attacks 2025-03-12 at 07:06 By Help Net Security EDR bypass and killer attacks are surging, yet many organizations continue to overlook this threat while they have become over-reliant on this security tool – particularly when preventing ransomware. In this Help Net Security video, John Dwyer, Director of Security Research at Binary

React to this headline:

Loading spinner

Defending against EDR bypass attacks Read More »

Who’s in your digital house? The truth about third-party access

Who’s in your digital house? The truth about third-party access 2025-03-10 at 07:01 By Help Net Security In this Help Net Security video, Fran Rosch, CEO at Imprivata, discusses organizations’ challenges in securing third-party access and offers valuable insights on how businesses can address these risks effectively. A recent report conducted by the Ponemon Institute,

React to this headline:

Loading spinner

Who’s in your digital house? The truth about third-party access Read More »

AI threats and workforce shortages put pressure on security leaders

AI threats and workforce shortages put pressure on security leaders 2025-03-07 at 07:30 By Help Net Security In this Help Net Security video, John Grancarich, Fortra’s Chief Strategy Officer, discusses the 2025 Fortra State of Cybersecurity Survey and highlights escalating concerns among security professionals about AI-driven threats and a shortage of cybersecurity skills. The survey

React to this headline:

Loading spinner

AI threats and workforce shortages put pressure on security leaders Read More »

Scammers take over social media

Scammers take over social media 2025-03-05 at 07:02 By Help Net Security In Q4 2024, cyber threats reached unprecedented levels, with 2.55 billion attacks blocked, equating to 321 threats every second. In this Help Net Security video, Luis Corrons, Security Evangelist at Gen, discusses a new Gen report that highlights a troubling trend: social media

React to this headline:

Loading spinner

Scammers take over social media Read More »

Why a push for encryption backdoors is a global security risk

Why a push for encryption backdoors is a global security risk 2025-03-04 at 07:36 By Help Net Security Governments in the UK, US, and Europe are pressuring tech companies to weaken encryption in the name of security. The latest push from the UK government demanding Apple create a backdoor to encrypted iCloud data is just

React to this headline:

Loading spinner

Why a push for encryption backdoors is a global security risk Read More »

Innovation vs. security: Managing shadow AI risks

Innovation vs. security: Managing shadow AI risks 2025-03-03 at 18:02 By Help Net Security In this Help Net Security video, Tim Morris, Chief Security Advisor at Tanium, shares practical best practices to help organizations balance innovation and security while leveraging AI. Morris warns of an even riskier shadow AI trend in which departments, unsatisfied with

React to this headline:

Loading spinner

Innovation vs. security: Managing shadow AI risks Read More »

The art of balancing data security with business goals

The art of balancing data security with business goals 2025-02-28 at 07:32 By Help Net Security In this Help Net Security video, Nathan Parks, Senior Research Specialist at Gartner, discusses their recent research, revealing that only 14% of security leaders effectively balance data security with business goals. 35% of leaders are focused on securing data,

React to this headline:

Loading spinner

The art of balancing data security with business goals Read More »

How enterprise leaders can secure and govern agentic AI

How enterprise leaders can secure and govern agentic AI 2025-02-26 at 08:20 By Help Net Security In this Help Net Security video, Nataraj Nagaratnam, an IBM Fellow and CTO for Cloud Security, discusses enterprises’ steps to lay a secure foundation for agentic AI deployments. Recent research from IBM and Morning Consult shows that 99% of

React to this headline:

Loading spinner

How enterprise leaders can secure and govern agentic AI Read More »

Why AI deployment requires a new level of governance

Why AI deployment requires a new level of governance 2025-02-24 at 07:09 By Help Net Security In this Help Net Security video, Lee Waskevich, VP of Security at ePlus, discusses how AI deployment demands enhanced governance and stricter controls, particularly in managing data. The recent ePlus AI Readiness survey revealed that the top data concerns

React to this headline:

Loading spinner

Why AI deployment requires a new level of governance Read More »

VC-backed cybersecurity startups and the exit crunch

VC-backed cybersecurity startups and the exit crunch 2025-02-19 at 07:31 By Help Net Security The cybersecurity startup landscape is at a crossroads. As venture-backed companies strive for successful exits, the bar has risen dramatically, requiring more funding, higher revenue, and faster growth than ever before. In this Help Net Security video, Mark Kraynak, Founding Partner

React to this headline:

Loading spinner

VC-backed cybersecurity startups and the exit crunch Read More »

The hidden risks of a broken data provisioning system

The hidden risks of a broken data provisioning system 2025-02-17 at 07:04 By Help Net Security In this Help Net Security video, Bart Koek, Field CTO at Immuta, discusses their 2025 State of Data Security Report, highlighting emerging challenges for IT and data security leaders. Key takeaways from the report: GenAI is causing significant change

React to this headline:

Loading spinner

The hidden risks of a broken data provisioning system Read More »

CISOs and boards see things differently

CISOs and boards see things differently 2025-02-13 at 06:35 By Help Net Security Splunk’s latest CISO Report reveals critical insights into cybersecurity priorities, threat trends, and strategies for resilience. In this Help Net Security video, Kirsty Paine, Field CTO & Strategic Advisor at Splunk, discusses the key findings and what they mean for security teams.

React to this headline:

Loading spinner

CISOs and boards see things differently Read More »

Evolving uses of tokenization to protect data

Evolving uses of tokenization to protect data 2025-02-10 at 06:04 By Help Net Security Tokenization replaces sensitive data, such as credit card numbers or personal identifiers, with unique, non-sensitive tokens with no exploitable value. This method helps protect sensitive information by ensuring that the actual data is never stored or transmitted, reducing the risk of

React to this headline:

Loading spinner

Evolving uses of tokenization to protect data Read More »

The API security crisis and why businesses are at risk

The API security crisis and why businesses are at risk 2025-02-05 at 06:30 By Help Net Security In this Help Net Security video, Ivan Novikov, CEO of Wallarm, discusses the 2025 API ThreatStats Report, highlighting how APIs have become the primary attack surface over the past year, mainly driven by the rise of AI-related risks.

React to this headline:

Loading spinner

The API security crisis and why businesses are at risk Read More »

SEC and FCA fines: Issues jump

SEC and FCA fines: Issues jump 2025-01-29 at 06:33 By Help Net Security The financial sector faces communication compliance challenges as organizations struggle to maintain oversight across communication channels. Adding to the complexity is the unexpected rise of unconventional platforms, such as Snapchat, used for business operations. In this Help Net Security video, David Clee,

React to this headline:

Loading spinner

SEC and FCA fines: Issues jump Read More »

Cyber trends set to influence business strategies

Cyber trends set to influence business strategies 2025-01-27 at 06:42 By Help Net Security Diligent convened a group of 65 board members, C-suite executives, and leading subject matter experts to explore topics shaping the future of business: generative AI, cybersecurity and data privacy, geopolitical risk, and financial fraud and abuse. In this Help Net Security

React to this headline:

Loading spinner

Cyber trends set to influence business strategies Read More »

Funding soars in a milestone year for Israeli cybersecurity

Funding soars in a milestone year for Israeli cybersecurity 2025-01-23 at 06:03 By Help Net Security In this Help Net Security video, Or Salom, Analyst at YL Ventures, discusses the State of the Cyber Nation Report 2024. The report reveals resilience and growth in the Israeli cybersecurity industry, with total investments reaching $4 billion across

React to this headline:

Loading spinner

Funding soars in a milestone year for Israeli cybersecurity Read More »

NDR’s role in a modern cybersecurity stack

NDR’s role in a modern cybersecurity stack 2025-01-20 at 06:33 By Help Net Security Attacks happen frequently on the security stack or within an enterprise. Often, they’re carried out by some unknown entity on the other side of the globe. You don’t know who you’re dealing with. You don’t know who they are. In this

React to this headline:

Loading spinner

NDR’s role in a modern cybersecurity stack Read More »

Scroll to Top