cybersecurity
![Kevin Valk](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/29110533/kevin_valk-2-codean-400x200.jpg)
What does optimal software security analysis look like?
In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools for software security. He explains how these …
![ChatGPT](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/04124959/chatgpt-future2-400x200.jpg)
ChatGPT on the chopping block as organizations reevaluate AI usage
ChatGPT has attracted hundreds of millions of users and was initially praised for its transformative potential. However, concerns for safety controls and unpredictability have …
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/10123028/ciso-400x200.jpg)
The secret habits of top-performing CISOs
69% of top-performing CISOs dedicate recurring time on their calendars for personal professional development, according to Gartner. This is compared with just 36% of …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/29104413/open_source1-400x200.jpg)
A closer look at the RFI on open-source software security
The U.S. Office of the National Cyber Director (ONCD) released a request for information (RFI) entitled Open-Source Software Security: Areas of Long-Term Focus and …
![Velociraptor](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/28145845/velociraptor-digital-forensics-1400-400x200.jpg)
Velociraptor: Open-source digital forensics and incident response
Velociraptor is a sophisticated digital forensics and incident response tool designed to improve your insight into endpoint activities. Velociraptor enables you to conduct …
![Healthcare IoT](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093856/heathcare-iot-400x200.jpg)
Rising cyber incidents challenge healthcare organizations
Healthcare organizations are facing many cybersecurity challenges that require them to increasingly prioritize cybersecurity and compliance, according to Claroty. Threat …
![Patrice Auffret](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/23112810/patrice_auffret-2-onyphe-400x200.jpg)
What makes a good ASM solution stand out
In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that …
![database](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151902/database-400x200.jpg)
Is the cybersecurity community’s obsession with compliance counter-productive?
Does anyone think the chances of surviving a plane crash increase if our tray tables are locked and our carry-on bags are completely stowed under our seats? That we’ll be OK …
![cybersecurity search engines](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/23094701/cybersecurity_search_engines-1400-400x200.jpg)
11 search engines for cybersecurity research you can use right now
Staying ahead in cybersecurity requires constant learning and adaptation. If you’re interested in cybersecurity research, explore the resources outlined below. …
![SaaS](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27135719/saas-400x200.jpg)
IT leaders alarmed by generative AI’s SaaS security implications
IT leaders are grappling with anxiety over the risks of generative AI despite continued confidence in their software-as-a-service (SaaS) security posture, according to Snow …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093146/robot-400x200.jpg)
Uncovering a privacy-preserving approach to machine learning
In the era of data-driven decision making, businesses are harnessing the power of machine learning (ML) to unlock valuable insights, gain operational efficiencies, and …
![Florian Forster](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131036/florian_forster-2-zitadel-400x200.jpg)
Adapting authentication to a cloud-centric landscape
In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?