automation
![Anya Shpilman](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/31122017/anya_shpilman-2-wdigital-400x200.jpg)
Choosing the right partner when outsourcing cybersecurity
In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential risks of outsourcing …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143233/cyber-threat2-400x200.jpg)
Cybersecurity teams hesitate to use automation in TDIR workflows
Despite reported threat detection, investigation, and response (TDIR) improvements in security operations, more than half of organizations still experienced significant …
![mental health](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165903/mental_health-400x200.png)
Best practices to mitigate alert fatigue
In this Help Net Security video, Peter Manev, Chief Strategy Officer at Stamus Networks, discusses a pervasive problem plaguing security analysts called “alert fatigue,” – …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/02151220/api-400x200.jpg)
API security in 2024: Predictions and trends
As technology continues to advance at an unprecedented pace, so does the complexity of API (application programming interface) security. With the proliferation of APIs in …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03114213/idea-1-400x200.jpg)
5 pivotal cybersecurity trends for 2024
In 2023, cyberattacks surged both in terms of frequency and sophistication. The proliferation of cutting-edge hacking tools and technologies – now more accessible than ever …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101938/genai4-400x200.jpg)
The dawn of the autonomous enterprise is on the horizon
90% of IT decision-makers plan to deploy more automation, including AI, in the next 12 months, according to Digitate. IT leaders embrace AI-powered automation 26% of …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101944/genai2-400x200.jpg)
11 GenAI cybersecurity surveys you should read
Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. However, as the integration of …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03114206/brain-400x200.jpg)
Balancing AI’s promise with privacy and intellectual property concerns
Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key …
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26142020/ciso2-400x200.jpg)
CIOs shape long-term success with GenAI expertise
Today’s CIOs have evolved from managing IT infrastructure and ensuring systems’ efficiency to becoming key business strategists, according to IDC. They stand at …
![executive](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171247/executive-400x200.jpg)
Digital ops and ops management security predictions for 2024
CISOs don’t need a crystal ball – they already know that 2024 will be another tough year, especially with AI at everyone’s mind. Instead of playing catch-up regarding …
![certificates](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26115302/certificates1-400x200.jpg)
Why are IT professionals not automating?
As an IT professional, you understand the value of automation, and like many IT experts, you may approach it with a mix of excitement and apprehension. Automation is a …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101938/genai4-400x200.jpg)
Security automation gains traction, prompting a “shift everywhere” philosophy
The use of automated security technology is growing rapidly, which in turn is propagating the “shift everywhere” philosophy – performing security tests throughout the entire …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders