Please turn on your JavaScript for this page to function normally.
Android Scam Detection
Google launches on-device AI to alert Android users of scam calls in real-time

Google has announced new security features for Android that provide real-time protection against scams and harmful apps. These features, powered by advanced on-device AI, …

cybersecurity predictions
Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage

Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide …

Arun Gupta
How Intel is making open source accessible to all developers

In this Help Net Security interview, Arun Gupta, Vice President and General Manager for Open Ecosystem, Intel, discusses the company’s commitment to fostering an open …

identity
What 2025 holds for user identity protection

In this Help Net Security video, David Cottingham, President of rf IDEAS, discusses what he sees as the most prominent areas for improvement and continued change in the space: …

risk management
How cybersecurity failures are draining business budgets

Security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to …

malware
Infostealers increasingly impact global security

Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant …

Daniel Schwalbe
CISOs in 2025: Balancing security, compliance, and accountability

In this Help Net Security interview, Daniel Schwalbe, CISO at DomainTools, discusses the intensifying regulatory demands that have reshaped CISO accountability and daily …

AI
Cyber professionals face an IP loss reckoning in 2025

AI can expose your work secrets. The same goes for AI-generated content, which has revolutionized workplace productivity but comes with hidden risks. As more employees use AI …

cybersecurity job interview
Tips for a successful cybersecurity job interview

Whether you’re looking to enhance your existing cybersecurity skills or just beginning your journey in the field, cybersecurity offers a wide range of career opportunities. If …

identity, face, code, privacy, person
The changing face of identity security

It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find …

Chris Wysopal
Evaluating your organization’s application risk management journey

In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. …

cybersecurity regulations
Ambitious cybersecurity regulations leave companies in compliance chaos

While the goal of cybersecurity regulations is to bring order among organizations and ensure they take security and risks seriously, the growing number of regulations has also …

Don't miss

Cybersecurity news