Please turn on your JavaScript for this page to function normally.
Shane Buckley
The hidden costs of security tool bloat and how to fix it

In this Help Net Security interview, Shane Buckley, President and CEO at Gigamon, discusses why combating tool bloat is a top priority for CISOs as they face tighter budgets …

cyber insurance
Cyber insurance isn’t always what it seems

Many companies think cyber insurance will protect them from financial losses after an attack. But many policies have gaps. Some claims get denied. Others cover less than …

cybersecurity open-source tools
Hottest cybersecurity open-source tools of the month: March 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Hetty: Open-source …

key
ETSI releases security standard for the quantum future

ETSI launched post-quantum security standard to guarantee the protection of critical data and communications in the future. The specification “Efficient Quantum-Safe …

hand
China-linked FamousSparrow APT group resurfaces with enhanced capabilities

ESET investigated suspicious activity on the network of a trade group in the United States that operates in the financial sector. While helping the affected entity remediate …

AI
A CISO’s guide to securing AI models

In AI applications, machine learning (ML) models are the core decision-making engines that drive predictions, recommendations, and autonomous actions. Unlike traditional IT …

dark web
How does your data end up on the dark web?

The dark web is a hidden corner of the internet where people can remain anonymous. It’s often confused with the deep web, but they’re not quite the same thing. The deep web is …

The Developer's Playbook for Large Language Model Security
Review: The Developer’s Playbook for Large Language Model Security

With the adoption of large language models (LLMs) across industries, security teams often play catch-up. Many organizations are integrating GenAI into customer interactions, …

Microsoft Copilot for Security
Microsoft’s new AI agents take on phishing, patching, alert fatigue

Microsoft is rolling out a new generation of AI agents in Security Copilot, built to help with some of the most time-consuming security challenges, such as phishing, data …

Cynomi_vCISO_Academy
The vCISO Academy: Transforming MSPs and MSSPs into cybersecurity powerhouses

By now, it’s no secret—cyber threats are on the rise, and the need for strong cybersecurity is greater than ever. Globally small and medium-sized businesses (SMBs) are prime …

data analytics
Spring clean your security data: The case for cybersecurity data hygiene

Spring cleaning isn’t just for your closets; security teams should take the same approach to their security operations data, where years of unchecked log growth have created a …

botnet
OT systems are strategic targets in global power struggles

Compared to 2023, 2024 saw a smaller increase in cyberattacks that caused physical consequences on OT organizations, according to Waterfall Security. Nevertheless, there were …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools