Please turn on your JavaScript for this page to function normally.
protecting personal information
Protecting your personal information from data brokers

How aware are you that your personal information could be bought and sold without your consent—and that there are companies whose entire business model revolves around this? …

database
53% of security teams lack continuous and up-to-date visibility

Enterprises lack visibility into their own data, creating security risks that are compounding as organizations and their employees increase AI adoption, according to Bedrock …

Apple UK
Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access the encrypted data, which remains secure …

GenAI
89% of enterprise AI usage is invisible to the organization

Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal …

data analytics
Prioritizing data and identity security in 2025

To say that the cybersecurity landscape has grown more complex over the past several years would be a dramatic understatement. Attackers have more resources at their …

CISO
Why a push for encryption backdoors is a global security risk

Governments in the UK, US, and Europe are pressuring tech companies to weaken encryption in the name of security. The latest push from the UK government demanding Apple create …

strategy
The art of balancing data security with business goals

In this Help Net Security video, Nathan Parks, Senior Research Specialist at Gartner, discusses their recent research, revealing that only 14% of security leaders effectively …

AI
Why AI deployment requires a new level of governance

In this Help Net Security video, Lee Waskevich, VP of Security at ePlus, discusses how AI deployment demands enhanced governance and stricter controls, particularly in …

digital transformation
Security and privacy concerns challenge public sector’s efforts to modernize

For most public sector organizations, digital transformation is a work in progress, with the complexity of integrating new systems and privacy and security concerns remaining …

Chester Wisniewski
Mastering the cybersecurity tightrope of protection, detection, and response

In this Help Net Security interview, Chester Wisniewski, Director and Global Field CISO at Sophos, discusses the shifting ransomware landscape, the risks posed by quantum …

AI
The hidden risks of a broken data provisioning system

In this Help Net Security video, Bart Koek, Field CTO at Immuta, discusses their 2025 State of Data Security Report, highlighting emerging challenges for IT and data security …

Deepseek
DeepSeek’s popularity exploited by malware peddlers, scammers

As US-based AI companies struggle with the news that the recently released Chinese-made open source DeepSeek-R1 reasoning model performs as well as theirs for a fraction of …

Don't miss

Cybersecurity news