Please turn on your JavaScript for this page to function normally.
breach
Only 13% of organizations are cyber mature

A staggering 83% of organizations have suffered a material security breach recently, with over half occurring in the past year alone, underscoring the critical need for …

Martin Reynolds
Maintaining human oversight in AI-enhanced software development

In this Help Net Security interview, Martin Reynolds, Field CTO at Harness, discusses how AI can enhance the security of software development and deployment. However, …

money
Companies spend more on cybersecurity but struggle to track expenses

Most companies do not know how effectively they are investing money to fight the cybersecurity threat, according to Optiv. Cybersecurity budgets are increasing and cyber …

Lingping Gao
Leveraging no-code automation for efficient network operations

In this Help Net Security interview, Lingping Gao, CEO at NetBrain, discusses the challenges NetOps teams face in maintaining production services due to outdated processes and …

cyber resilience
The impossibility of “getting ahead” in cyber defense

As a security professional, it can be tempting to believe that with sufficient resources we can achieve of state of parity, or even relative dominance, over cyber attackers. …

CISO
Inside the minds of CISOs

In this Help Net Security video, Nick McKenzie, CISO of Bugcrowd, discusses the key findings from their recent report, which comes at a crucial time as security leaders’ …

GenAI
Deepfakes and voice clones are undermining election integrity

As the volume of digital business rises year over year, the potential for AI-enhanced digital fraud increases with it, according to Telesign. A new Telesign report highlights …

Richard Hummel
Why every company needs a DDoS response plan

In this Help Net Security interview, Richard Hummel, Senior Threat Intelligence Manager at NETSCOUT, discusses how companies can overcome the challenges of identifying and …

Swissbit iShield Key Pro
Product showcase: Protect digital identities with Swissbit’s iShield Key Pro

In today’s fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these …

quantum computing
Preparing for Q-Day as NIST nears approval of PQC standards

Q-Day—the day when a cryptographically relevant quantum computer can break most forms of modern encryption—is fast approaching, leaving the complex systems our societies rely …

CISO
CISOs becoming more comfortable with risk levels

Shifts in the cyber threats landscape have changed the way today’s CISOs evaluate their business’s risk appetite, according to Netskope. CISO risk appetite levels …

Michelle Weston
Leveraging AI and automation for enhanced security operations

In this Help Net Security interview, Michelle Weston, VP of Security & Resiliency at Kyndryl, discusses the key challenges in security operations and how to address them. …

Don't miss

Cybersecurity news