cybersecurity
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145259/laptop-ai-400x200.png)
How should organizations navigate the risks and opportunities of AI?
As we realize exciting new advancements in the application of generative pre-trained transformer (GPT) technology, our adversaries are finding ingenious ways to leverage these …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094415/money-1-400x200.jpg)
Financial crime compliance costs exceed $206 billion
The growing complexity of compliance regulations and ever-evolving criminal methodologies are a major difficulty for financial institutions, according to LexisNexis Risk …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203445/data_analytics1-400x200.jpg)
Why California’s Delete Act matters for the whole country
The California State Legislature passed Senate Bill 362, known as the Delete Act, to simplify the process for consumers to ask to remove their personal data gathered by data …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27170007/money-bank-400x200.jpg)
Cybersecurity budgets show moderate growth
Despite the economic uncertainty and inflation, security budgets generally continued to rise but at a lower rate than prior years, according to new research from IANS and …
![Raffaele Mautone](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/15110124/raffaele_mautone-2-judy_security-400x200.jpg)
The hidden costs of neglecting cybersecurity for small businesses
In this Help Net Security interview, Raffaele Mautone, CEO of Judy Security, talks about the cybersecurity problems that small businesses face and the need for prioritization …
![kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/13214620/kubernetes-logo-400x200.jpg)
Kubernetes attacks in 2023: What it means for the future
In 2023, a wave of new attacks targeting Kubernetes has been reported, from Dero and Monero crypto mining to Scarleteel and RBAC-Buster. In this Help Net Security video, Jimmy …
![certificates](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26115302/certificates1-400x200.jpg)
The clock is ticking for businesses to prepare for mandated certificate automation
Many organizations are unprepared for sweeping industry changes that call for mandated certificate automation, according to GMO GlobalSign. There could be significant changes …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/27174916/ransomware-hands-400x200.jpg)
Ransomware groups are shifting their focus away from larger targets
One in every six ransomware attacks targeting US government offices was traced back to the LockBit ransomware group, according to Trend Micro. Overall ransomware attack victim …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12090833/vulnerability-bug-400x200.jpg)
High number of security flaws found in EMEA-developed apps
Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their US counterparts, according to …
![Nima Baiati](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/21112757/nima_baiati-2-lenovo-400x200.jpg)
The pitfalls of neglecting security ownership at the design stage
For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of inputs …
![digital identity](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20132920/digital_identity1-400x200.jpg)
Is your identity safe? Exploring the gaps in threat protection
A recent study from Silverfort has identified the identity attack surface as today’s most substantial weakness in cybersecurity resilience. Traditional approaches, such …
![Network Flight Simulator](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/23135145/network_flight_simulator-1400-400x200.jpg)
Network Flight Simulator: Open-source adversary simulation tool
Network Flight Simulator is a lightweight utility that generates malicious network traffic and helps security teams evaluate security controls and network visibility. The tool …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?