Please turn on your JavaScript for this page to function normally.
API security
Exposed APIs and issues in the world’s largest organizations

In this Help Net Security video, Tristan Kalos, CEO of Escape, discusses the results of its 2024 State of API Exposure report. The study highlights significant API security …

Allison Ritter
Why crisis simulations fail and how to fix them

In this Help Net Security interview, Allison Ritter, Head of Cyber Experiential Exercising at Cyberbit, shares her insights on the key differences between in-person and …

Containers
Containers have 600+ vulnerabilities on average

Containers are the fastest growing – and weakest cybersecurity link – in software supply chains, according to NetRise. Companies are struggling to get container …

key
Preventing data leakage in low-node/no-code environments

Low-code/no-code (LCNC) platforms enable application development by citizen developers, often generating “shadow engineering” projects that evade security oversight. While …

Phani Dasari
Strengthening security posture with comprehensive cybersecurity assessments

In this Help Net Security interview, Phani Dasari, CISO at HGS, discusses key aspects of cybersecurity assessments, including effective tools and methodologies, the role of AI …

James Dolph
Who handles what? Common misconceptions about SaaS security responsibilities

In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in …

cybersecurity career
What makes for a fulfilled cybersecurity career

In this Help Net Security video, Richard Hummel, NETSCOUT’s Director of Threat Intelligence, talks about his journey into cybersecurity and offers insight for those that …

cybersecurity books
Top cybersecurity books for your holiday gift list

The holiday season is approaching, and with it, the tradition of gift-giving. For professionals and enthusiasts alike, a well-chosen book can provide both knowledge and …

email
Businesses plagued by constant stream of malicious emails

36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion emails processed through their …

Resecurity
Resecurity introduces AI-powered GSOC at NATO Edge 2024

Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC) during NATO Edge 2024, the NATO Communications and …

Gareth Lindahl-Wise
Building a robust security posture with limited resources

In this Help Net Security interview, Gareth Lindahl-Wise, CISO at Ontinue, discusses how business leaders can align innovation with cybersecurity, tackle the risks posed by …

GenAI
GenAI makes phishing attacks more believable and cost-effective

GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a …

Don't miss

Cybersecurity news