Please turn on your JavaScript for this page to function normally.
identity, face, code, privacy, person
The changing face of identity security

It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find …

Chris Wysopal
Evaluating your organization’s application risk management journey

In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. …

patch tuesday
November 2024 Patch Tuesday forecast: New servers arrive early

November 2024 Patch Tuesday is now live: Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039) Microsoft followed their October precedent set with …

veteran
4 reasons why veterans thrive as cybersecurity professionals

Through their past military service, veterans are trained to think like adversaries, often share that mission-driven spirit and excel when working with a team to achieve a …

Alex Freedland
Strategies for CISOs navigating hybrid and multi-cloud security

In this Help Net Security interview, Alex Freedland, CEO at Mirantis, discusses the cloud security challenges that CISOs need to tackle as multi-cloud and hybrid environments …

certificates
Apple’s 45-day certificate proposal: A call to action

In a bold move, Apple has published a draft ballot for commentary to GitHub to shorten Transport Layer Security (TLS) certificates down from 398 days to just 45 days by 2027. …

Buzz Hillestad
How AI will shape the next generation of cyber threats

In this Help Net Security interview, Buzz Hillestad, CISO at Prismatic, discusses how AI’s advancement reshapes cybercriminal skillsets and lowers entry barriers for …

data privacy
Consumer privacy risks of data aggregation: What should organizations do?

In September 2024, the Federal Trade Commission (FTC) released an eye-opening report that digs into the data habits of nine major tech giants, including Amazon (Twitch), …

Julie Madhusoodanan
The cybersecurity gender gap: How diverse teams improve threat response

In this Help Net Security interview, Julie Madhusoodanan, Head of Cybersecurity – Identity, Posture Management and Security Infrastructure at LinkedIn, discusses how …

open source
Open-source software: A first attempt at organization after CRA

The open-source software (OSS) industry is developing the core software for the global infrastructure, to the point that even some proprietary software giants adopt Linux …

Barry Mainz
Maximizing security visibility on a budget

In this Help Net Security interview, Barry Mainz, CEO at Forescout, discusses the obstacles organizations encounter in attaining security visibility, particularly within cloud …

Mike McNeil
How open-source MDM solutions simplify cross-platform device management

In this Help Net Security interview, Mike McNeil, CEO at Fleet, talks about the security risks posed by unmanaged mobile devices and how mobile device management (MDM) …

Don't miss

Cybersecurity news