![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07131853/laptop-tech-400x200.jpg)
6 steps to accelerate cybersecurity incident response
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a …
![Kai Roer](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/30125220/kai_roer-2-praxis_security_labs-400x200.jpg)
How human behavior research informs security strategies
In this Help Net Security interview, Kai Roer, CEO at Praxis Security Labs, explores the theoretical underpinnings, practical implications, and the crucial role of human …
![Alex Ionescu](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/28105828/alex_ionescu-2-windows_internals-400x200.jpg)
From Windows 9x to 11: Tracing Microsoft’s security evolution
Over its journey from Windows 9x to Windows 11, Microsoft has implemented multiple security overhauls, each addressing the challenges of its time and setting the stage for …
![Troy Hawes](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/19124937/troy_hawes-2-moss_adams-400x200.jpg)
A closer look at healthcare’s battle with AI-driven attacks
With its wealth of sensitive patient data, the healthcare industry has become a prime target for cybercriminals leveraging AI tools. As these threats continue to evolve, …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/11092828/lock-computer-blue-400x200.jpg)
Vulnerability management metrics: How to measure success
Without the right metrics, vulnerability management is pretty pointless. If you’re not measuring, how do you know it’s working? So how do you know what to focus on? The list …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/17130642/ransomware-1600-400x200.jpg)
The dangers of dual ransomware attacks
At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This déjà vu seems to await …
![Guy Guzner](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27113438/guy_guzner-2-savvy_security-400x200.jpg)
AI threat landscape: Model theft and inference attacks emerge as top concerns
Generative AI has emerged as a powerful tool, heralded for its potential but also scrutinized for its implications. Enterprises will invest nearly $16 billion worldwide on …
![computer](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/25163438/computer-2-400x200.jpg)
OT cyber attacks proliferating despite growing cybersecurity spend
The sharp increase in attacks on operational technology (OT) systems can be primarily attributed to two key factors: the escalating global threats posed by nation-state actors …
![approved](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/26115049/gears-shield-approved2-400x200.jpg)
What is operational risk and why should you care? Assessing SEC rule readiness for OT and IoT
The newly released Security and Exchange Commission (SEC) cyber incident disclosure rules have been met with mixed reviews. Of particular concern is whether public companies …
![fighting ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/31110403/fighting_ransomware-400x200.jpg)
Bracing for AI-enabled ransomware and cyber extortion attacks
AI has been the shiniest thing in tech since at least November 2022, when ChatGPT was made available to the masses and unveiled the transformative potential of large language …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26142233/keys3-400x200.jpg)
How passkeys are changing the face of authentication
As passwordless identity becomes mainstream, the term “passkey” is quickly becoming a new buzzword in cybersecurity. But what exactly is a passkey and why do we need them? A …
![Brent Deterding](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/12115549/brent_deterding-2-afni-400x200.jpg)
The real impact of the cybersecurity poverty line on small organizations
The financial constraints many smaller organizations face often cast shadows on their ability to fortify defenses. In this Help Net Security interview, Brent Deterding, CISO …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)