cybersecurity
![Roland Atoui](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131101/roland_atoui-2-red_alert_labs-400x200.jpg)
Anticipating the next wave of IoT cybersecurity challenges
In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19153210/email-400x200.jpg)
Cybercriminals turn to AI to bypass modern email security measures
Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094342/danger-400x200.jpg)
Large-scale breaches overshadow decline in number of healthcare data incidents
While H1 2023 saw an encouraging decrease in the overall number of data breaches impacting healthcare organizations, it was overshadowed by large-scale breaches resulting in a …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07131850/lock-texture-400x200.jpg)
IT’s rising role in physical security technology
As the adoption of cloud-based and mobile-access security systems continues to increase among both new and established businesses, the lines between traditional physical …
![Kennedy Torkura](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131056/kennedy_torkura-2-mitigant-400x200.jpg)
Maintaining consistent security in diverse cloud infrastructures
As cloud infrastructures become increasingly API-driven and dynamically spread across expansive attack surfaces, achieving clarity proves difficult. Compounding this challenge …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26141959/api2-400x200.jpg)
Understanding how attackers exploit APIs is more important than ever
In this Help Net Security video, Andy Hornegold, Product Lead at Intruder, dives into API security and explores how several recent high-profile breaches were caused by simple …
![law](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/29115411/tekz6666_justice_law_computer_keyboard_343e48d3-44fb-4ffc-911f-2ce012d904ec-400x200.jpg)
How EU lawmakers can make mandatory vulnerability disclosure responsible
There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability: The organization works quickly to fix the …
![David Gugelmann](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131031/david_gugelmann-2-exeon-400x200.jpg)
Network detection and response in the modern era
In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19153422/email3-400x200.jpg)
Organizations invest in AI tools to elevate email security
To counteract new and emerging threat methods enhanced by artificial intelligence, specialized email security vendors are leveraging a synergy of AI and human insights to …
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/10123028/ciso-400x200.jpg)
The complex world of CISO responsibilities
A Chief Information Security Officer (CISO) plays a crucial role in protecting an organization’s digital assets. They are responsible for ensuring the security of …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165916/brain-3d-400x200.png)
4 ways simulation training alleviates team burnout
Burnout is endemic in the cybersecurity industry, damaging the mental and physical health of cyber professionals and leaving organizations underskilled, understaffed, and …
![Rohit Bohara](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/10131457/rohit_bohara-2-asvin-400x200.jpg)
Reinventing OT security for dynamic landscapes
From understanding the challenges of disparate OT protocols and the increasing convergence with IT to grappling with the monumental role of human error, our latest interview …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?