Please turn on your JavaScript for this page to function normally.
network
Every minute, 4,080 records are compromised in data breaches

A recent Domo report shows that the world’s internet population has reached a record high of 5.52 billion people and uncovers signs that AI may be unseating digital …

world
Regulations, security, and remote work: Why network outsourcing is booming

A growing number of enterprises in the US are adopting managed network services to support AI and other new technologies across increasingly complex networks, according to …

Dan Lohrmann
Leadership skills for managing cybersecurity during digital transformation

In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the …

breach
AI learning mechanisms may lead to increase in codebase leaks

The proliferation of non-human identities and the complexity of modern application architectures have created significant security challenges, particularly in managing …

AI
Top 10 strategic technology trends shaping the future of business

The ethical and responsible use of technology is fast becoming part of the mandate for CIOs, as organizations balance the need for progress with the protection of …

API
The dark side of API security

APIs are the backbone of digital transformation efforts, connecting applications across organizations, so their security is of the utmost importance. In this Help Net Security …

Rickard Carlsson
CISOs’ strategies for managing a growing attack surface

In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital …

Nadir Izrael
Developing an effective cyberwarfare response plan

In this Help Net Security interview, Nadir Izrael, CTO at Armis, discusses how AI has transformed cyberwarfare by amplifying attacks’ scale and sophistication. Izrael …

Ashley Harrington
Managing cyberattack fallout: Financial and operational damage

In this Help Net Security, Ashley Harrington, Director of Cybersecurity at Aspida, discusses the impact of cyberattack on business operations and financial health. Beyond …

software
Security challenges mount as companies handle thousands of APIs

Modern applications are taking over enterprise portfolios, with apps classed as modern now making up 51% of the total, up by more than a quarter in the last year, according to …

digital transformation
Businesses must prioritize digital trust to avoid major problems

As organizations pursue digital transformation, they urgently need to prioritize digital trust to achieve their goals and prepare for future market opportunities, legislation, …

identity
Digital ID adoption: Implementation and security concerns

As digital transformation accelerates, understanding how businesses are preparing for and implementing digital ID technologies is crucial for staying ahead in security and …

Don't miss

Cybersecurity news