Please turn on your JavaScript for this page to function normally.
GenAI
Overreliance on GenAI to develop software compromises security

GenAI is quickly changing the software development process by automating tasks that once took developers hours, if not days, to complete, bolstering efficiency and …

compliance
Navigating the compliance labyrinth: A CSO’s guide to scaling security

Imagine navigating a labyrinth where the walls constantly shift, and the path ahead is obscured by fog. If this brings up a visceral image, you’ve either seen David Bowie’s …

Chris Wysopal
Evaluating your organization’s application risk management journey

In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. …

Lior Div
How agentic AI handles the speed and volume of modern threats

In this Help Net Security interview, Lior Div, CEO at Seven AI, discusses the concept of agentic AI and its application in cybersecurity. He explains how it differs from …

GenAI
Trust and risk in the AI era

55% of organizations say the security risks for their business have never been higher, according to Vanta. Yet the average company only dedicates 11% of its IT budget to …

Raymond Brancato
Enhancing firewall management with automation tools

In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to …

Kristian Kamber
Compliance frameworks and GenAI: The Wild West of security standards

In this Help Net Security interview, Kristian Kamber, CEO at SplxAI, discusses how security challenges for GenAI differ from traditional software. Unlike predictable software, …

Shane Cox
How human-led threat hunting complements automation in detecting cyber threats

In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and strategies in threat …

OT
AI expected to improve IT/OT network management

Once a peripheral concern, OT security has become a mandatory focus for organizations worldwide, according to Cisco’s report. The report provides a comprehensive look at …

data analytics
Threat intelligence: A blessing and a curse?

Access to timely and accurate threat intelligence is now core to security operations for many organizations. Today, it seems that security teams are blessed with an abundance …

data breach cost
Average data breach cost jumps to $4.88 million, collateral damage increased

IBM released its annual Cost of a Data Breach Report revealing the global average cost of a data breach reached $4.88 million in 2024, as breaches grow more disruptive and …

GenAI
16% of organizations experience disruptions due to insufficient AI maturity

While sysadmins recognize AI’s potential, significant gaps in education, cautious organizational adoption, and insufficient AI maturity hinder widespread implementation, …

Don't miss

Cybersecurity news