Please turn on your JavaScript for this page to function normally.
CrowdStrike, Delta
Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?

In a potentially groundbreaking dispute, Delta Air Lines is threatening to sue CrowdStrike, a leading cybersecurity firm, for alleged negligence and breach of contract. This …

shadow IT
Browser backdoors: Securing the new frontline of shadow IT

Browser extensions are a prime target for cybercriminals. And this isn’t just a consumer problem – it’s a new frontier in enterprises’ battle against shadow IT. …

Dean Hamilton
Key metrics for monitoring and improving ZTNA implementations

In this Help Net Security interview, Dean Hamilton, CTO at Wilson Perumal & Company, discusses the complexities of zero trust network access (ZTNA) implementation, …

patch tuesday
August 2024 Patch Tuesday forecast: Looking for a calm August release

August 2024 Patch Tuesday is now live: Microsoft fixes 6 zero-days under active attack July ended up being more ‘exciting’ than many of us wanted; we’re supposed to be in the …

NIS2
NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?

The Network and Information Security (NIS) 2 Directive is possibly one of the most significant pieces of cybersecurity regulation to ever hit Europe. The 27 EU Member States …

internet
How network segmentation can strengthen visibility in OT networks

What role does the firewall play in the protection of operational technology (OT) networks and systems? Many would say that it’s the defensive mechanism to protect that …

Kojin Oshiba
AI security 2024: Key insights for staying ahead of threats

In this Help Net Security interview, Kojin Oshiba, co-founder of Robust Intelligence, discusses his journey from academic research to addressing AI security challenges in the …

sport
Sports venues must vet their vendors to maintain security

Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of connectivity that include …

Doug Madory
Breaking down FCC’s proposal to strengthen BGP security

In this Help Net Security interview, Doug Madory, Director of Internet Analysis at Kentik, discusses the FCC’s proposal requiring major U.S. ISPs to implement RPKI Route …

AI
ITSM concerns when integrating new AI services

Let’s talk about a couple of recent horror stories. Late last year, a Chevrolet dealership deployed a chatbot powered by a large language model (LLM) on their homepage. This …

Bruno Kurtic
Scaling data security solutions: What you need to know

In this Help Net Security interview, Bruno Kurtic, President and CEO at Bedrock Security, discusses the role of data visibility in enhancing cybersecurity. He explains that …

AI
The role of AI in cybersecurity operations

Security operation centers (SOCs) need to be better equipped to manage the sheer scale of data to monitor and the increasing sophistication of threats. SOC analysts face a …

Don't miss

Cybersecurity news