Please turn on your JavaScript for this page to function normally.

artificial intelligence

Gareth Lindahl-Wise
Building a robust security posture with limited resources

In this Help Net Security interview, Gareth Lindahl-Wise, CISO at Ontinue, discusses how business leaders can align innovation with cybersecurity, tackle the risks posed by …

GenAI
GenAI makes phishing attacks more believable and cost-effective

GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a …

Niv Braun
Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks

In this Help Net Security interview, Niv Braun, CEO at Noma Security, discusses the difficulties security teams face due to the fragmented nature of AI processes, tools, and …

Doug Kersten
Treat AI like a human: Redefining cybersecurity

In this Help Net Security interview, Doug Kersten, CISO of Appfire, explains how treating AI like a human can change the way cybersecurity professionals use AI tools. He …

Alec Summers
Inside the 2024 CWE Top 25: Trends, surprises, and persistent challenges

In this Help Net Security interview, Alec Summers, Project Leader for the CVE Program at MITRE, shares his insights on the 2024 CWE top 25 most dangerous software weaknesses. …

security
How AI is transforming human risk management

While human error has always posed a cybersecurity risk, AI and emerging tech are playing an evolving role in Human Risk Management – uncovering new needs, challenges, and …

artificial intelligence
Modernizing incident response in the AI era

In this Help Net Security video, Gourav Nagar, Director of Information Security at Bill, discusses modernizing incident response in the era of AI and the cloud: Why this issue …

Liad Shnell
Choosing the right secure messaging app for your organization

In this Help Net Security interview, Liad Shnell, CTO at Rakuten Viber, discusses what organizations should look for in secure messaging apps, including encryption, privacy …

warehouse
Supply chain managers underestimate cybersecurity risks in warehouses

32% of warehouse respondents report that social engineering is one of the most-used entry points in warehouse cyberattacks – tied with software vulnerabilities (32%) and …

Windows Recall
Microsoft asks Windows Insiders to try out the controversial Recall feature

Participants of the Windows Insider Program that have a Qualcomm Snapdragon-powered Copilot+ PC can now try out Recall, the infamous snapshot-taking, AI-powered feature that …

quantum computing
AI Kuru, cybersecurity and quantum computing

As we continue to delegate more infrastructure operations to artificial intelligence (AI), quantum computers are advancing towards Q-day (i.e., the day when quantum computers …

Balázs Pózner
Overcoming legal and organizational challenges in ethical hacking

In this Help Net Security interview, Balázs Pózner, CEO at Hackrate, discusses the essential technical skills for ethical hackers and how they vary across different security …

Don't miss

Cybersecurity news