Help Net Security
![SearchInform FileAuditor](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/19174041/searchinform-fileauditor-400x200.jpg)
Product showcase: DCAP solution FileAuditor for data classification and access rights audit
The concept of DCAP solutions was introduced by Gartner experts, as it was clear, that without such solutions information security (IS) specialists would not be able to cope …
![computer](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/25163441/computer-1-400x200.jpg)
Why data, AI, and regulations top the threat list for 2024
The new year finds us confronted by a landscape characterized by political uncertainty, social fragmentation, escalating geopolitical tensions, and a turbulent macro-economic …
![industrial equipment](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/18140402/industrial-equipment-manufacturers-security-400x200.jpg)
A closer look at the manufacturing threat landscape
The manufacturing industry is embracing digital transformation to fuel efficiency and productivity. However, this evolution is accompanied by profound and growing …
![networking](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/18155333/networking-400x200.jpg)
How executives adapt to rising cybersecurity concerns in mobile networks
In this Help Net Security video, Rowland Corr, VP & Head of Government Relations at Enea, discusses the implications of burner phones and the crisis of confidence in …
![moving away from passwords](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/11141213/moving_away_from_passwords-1300-400x200.jpg)
Are organizations moving away from passwords?
Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/11092828/lock-computer-blue-400x200.jpg)
86% of cyberattacks are delivered over encrypted channels
Threats over HTTPS grew by 24% from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels, according to Zscaler. For the second …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/09170820/ai-brain-400x200.jpg)
AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime
Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their tools and boost their detection …
![ImmuniWeb AI Platform](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/15130924/immuniweb-ai-platform-400x200.jpg)
Product showcase: ImmuniWeb AI Platform
ImmuniWeb is a global application security company that currently serves over 1,000 customers from more than 50 countries. ImmuniWeb AI Platform has received numerous …
![connected car](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/16090900/connected-car-400x200.jpg)
Supply chain emerges as major vector in escalating automotive cyberattacks
In this Help Net Security video, Jay Yaneza, Cybersecurity Architect at VicOne, discusses how, in the first half of the year, cyberattacks on the automotive sector caused …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03114206/brain-400x200.jpg)
Balancing AI’s promise with privacy and intellectual property concerns
Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key …
![ALPHV Blackcat](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/19164856/alphv-blackcat-1400-400x200.jpg)
Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims
The US Justice Department announced today a disruption campaign against the Blackcat/ALPHV ransomware group and let victims know that there is a decryptor they can use. FBI …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160752/llms-2-400x200.jpg)
The impact of prompt injection in LLM agents
Prompt injection is, thus far, an unresolved challenge that poses a significant threat to Language Model (LLM) integrity. This risk is particularly alarming when LLMs are …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?