Help Net Security
Cybersecurity culture improves despite the dark clouds of the past year
Despite a hardening economic climate, heightened global tensions and the onset of new technology making cybercrime easier, 76% of the CISOs, suggested that no material …
How secure is your vehicle with digital key technology?
Digital key technology allows mobile devices to streamline approval for everyday access points, making it a fitting solution for the automotive industry. While there are a few …
How cybercriminals target energy companies
In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses how cybercriminals employ specialized strategies when targeting …
Fiddler Auditor: Open-source tool evaluates the robustness of large language models
Fiddler Auditor is an open-source tool designed to evaluate the robustness of Large Language Models (LLMs) and Natural Language Processing (NLP) models. LLMs can sometimes …
Cyber debt levels reach tipping point
The tension between difficult economic conditions and the pace of technology innovation, including the evolution of AI, is influencing the growth of identity-led cybersecurity …
Small organizations outpace large enterprises in MFA adoption
The use of MFA has nearly doubled since 2020 and that phishing-resistant authenticators represent the best choice in terms of security and convenience for users, according to …
What is a browser doing at Infosecurity Europe 2023?
What if the enterprise had complete control over the browser? What would it do for security, productivity, for work itself? Ari Yablok, Head Of Brand at Island, invites you to …
Beyond MFA: 3 steps to improve security and reduce customer authentication friction
For many people, life’s fundamental activities are now conducted online. We do our banking and shopping online, turn to the digital realm for entertainment and to access …
Enhancing security team capabilities in tough economic times
According to ESG, 70% of cybersecurity pros expect budget cuts or freezes this year, which, in turn, will trigger project delays and greater vendor scrutiny. Understaffing and …
Ignoring digital transformation is more dangerous than a recession
Business leaders worldwide understand they need to invest in digital transformation to meet a new innovation imperative, despite ongoing macroeconomic pressures and an …
IT providers become go-to for cybersecurity advice
61% of SMBs have been hit by a successful cyberattack in the last year, according to BlackFog. The research study, which examined the business impact of cybersecurity for …
3 ways we’ve made the CIS Controls more automation-friendly
Compliance obligations that support data privacy and cyber risk are nearly ubiquitous. Not only that, but they’re expanding. According to Gartner, government regulations …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd