cybersecurity
![executives](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/06113627/executives-400x200.jpg)
Serial cybersecurity founders get back in the game
“I didn’t really have a choice,” says Ben Bernstein, the former CEO and co-founder of Twistlock (acquired by Palo Alto Networks in 2019) and the CEO and co-founder of a new …
![chain](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/13152653/chain1-400x200.jpg)
The rise and evolution of supply chain attacks
A supply chain attack is a cyberattack that focuses on a third-party supplier providing essential services or software to the supply chain. In this Help Net Security video, …
![fake](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/08154901/fake_website-400x200.jpg)
Latest fraud schemes targeting the payments ecosystem
Threat actors continued to exploit technical misconfigurations through various fraud schemes, according to a new report from Visa. These include the use of malvertising and …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28200048/biometrics2-400x200.jpg)
Privacy concerns cast a shadow on AI’s potential for software development
Organizations are optimistic about AI, but AI adoption requires attention to privacy and security, productivity, and training, according to GitLab. “The transformational …
![devsecops](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/10085319/devsecops1-400x200.jpg)
Strategies for harmonizing DevSecOps and AI
The same digital automation tools that have revolutionized workflows for developers are creating an uphill battle regarding security. From data breaches and cyberattacks to …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
Companies need to rethink how they implement identity security
More than 80% of organizations have experienced an identity-related breach that involved the use of compromised credentials, half of which happened in the past 12 months, …
![executives](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/06113627/executives-400x200.jpg)
CISOs need to be forceful to gain leverage in the boardroom
Over 70% of CISOs feel that the importance of information security is not recognised by senior leadership, according to BSS. The CISOs said their top four highest investment …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
CISOs and board members work more closely than ever before
73% of board members believe they face the risk of a major cyber attack in the next 12 months, a notable increase from 65% in 2022, according to Proofpoint. Likewise, 53% feel …
![Adrien Petit](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/29110531/adrien_petit-2-uncovery-400x200.jpg)
The blueprint for a highly effective EASM solution
In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management …
![eyes](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20164642/eyes-400x200.jpg)
Empowering consumer privacy with network security
Every online interaction hinges on the bedrock of network security. With cyber threats and data breaches making headlines daily, businesses must understand how network …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19153210/email-400x200.jpg)
Email forwarding flaws enable attackers to impersonate high-profile domains
Sending an email with a forged address is easier than previously thought, due to flaws in the process that allows email forwarding, according to a research team led by …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26142004/api1-400x200.jpg)
Elevating API security to reinforce cyber defense
While APIs are essential to many operations and used extensively, a lack of prioritization and understanding is leading us towards a growing API security crisis, according to …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?