cybersecurity
![What to do (and what not to do) after a data breach](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11133014/what-to-do-data-breach-400x200.jpg)
What to do (and what not to do) after a data breach
Data breaches have been hitting the headlines left and right. Every time a breach occurs, the impacted organization’s response differs from the last. In this Help Net Security …
![chain](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/13152645/chain2-400x200.jpg)
Supply chain executives unaware of growing customer trust issues
Supply chain executives significantly overestimate stakeholder trust in their supply chain capabilities and intentions, according to Deloitte. Of more than 1,000 executives …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143236/network-cables-400x200.jpg)
Broadband consumers demand security and sustainability
Consumer expectations will reshape the needs and economics of the internet, according to Cisco. People in EMEA are rethinking what they rely on the internet for, balancing …
![medical](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094929/medical-400x200.jpg)
Healthcare organizations in the crosshairs of cyberattackers
In an era where cyber threats continue to evolve, healthcare organizations are increasingly targeted by malicious actors employing multiple attack vectors, according to …
![Charles Brooks](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/04105921/charles_brooks-2-georgetown_university_school_of_continuing_studies-400x200.jpg)
CISOs under pressure: Protecting sensitive information in the age of high employee turnover
In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks …
![quantum computing](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07084938/quantum_computing1-400x200.jpg)
Real-world examples of quantum-based attacks
Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/10085314/devsecops3-400x200.jpg)
Building resilience through DevSecOps
DevSecOps, short for Development, Security, and Operations, is an approach that emphasizes the integration of security practices and principles into every stage of the …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143238/cyber-threat1-400x200.jpg)
Generative AI outperforms hackers but not their creativity
72% of hackers are confident that AI cannot replace human creativity in security research and vulnerability management, according to Bugcrowd. Generative AI hacking Generative …
![satellite](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/12150612/satellite2-400x200.jpg)
Satellites lack standard security mechanisms found in mobile phones and laptops
Researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrücken have assessed the security mechanisms of satellites currently …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203453/data_analytics4-400x200.jpg)
Top priorities for chief audit executives in 2023
The top focus areas for chief audit executives (CAEs) in 2023 are advancing data analytics, assuring proliferating digital risks, and talent management, according to Gartner. …
![White House](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/13140217/whitehouse-2-400x200.jpg)
White House publishes National Cybersecurity Strategy Implementation Plan
The Biden-Harris Administration’s recently released National Cybersecurity Strategy calls for two fundamental shifts in how the United States allocates roles, …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160756/llms-1-400x200.jpg)
Combatting data governance risks of public generative AI tools
When companies utilize public generative AI tools, the models are refined on input data provided by the company. Regarding data security, unauthorized use of sensitive data or …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?