![Debbie Gordon](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/12134459/debbie_gordon-2-cloud_range-01-400x200.jpg)
Bridging the cybersecurity skills gap through cyber range training
In this Help Net Security interview, Debbie Gordon, CEO of Cloud Range explains the concept of a cyber range, its crucial role in preparing for real-world cyber threats, and …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203448/data_analytics2-400x200.jpg)
67% of daily security alerts overwhelm SOC analysts
Today’s security operations (SecOps) teams are tasked with protecting progressively sophisticated, fast-paced cyberattacks, according to Vectra AI. Yet, the complexity of …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094408/cloud2-400x200.jpg)
Incorporating cloud security teams into the SOC enhances operational efficiencies
Security leaders are recognizing that cloud and the way cloud security teams work today are becoming increasingly critical to business and IT operations, according to Trend …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094016/drown-400x200.jpg)
The warning signs for security analyst burnout and ways to prevent
Security analysts face the demanding task of investigating and resolving increasing volumes of alerts daily, while adapting to an ever-changing threat landscape and keeping up …
![Microsoft Security Copilot](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/29150233/microsoft-security-copilot-1600-400x200.jpg)
Microsoft unveils AI-powered Security Copilot analysis tool
Microsoft has unveiled Security Copilot, an AI-powered analysis tool that aims to simplify, augment and accelerate security operations (SecOps) professionals’ work. …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093901/ai1-400x200.jpg)
Most security pros turn to unauthorized AI tools at work
Security experts are increasingly resorting to unauthorized AI tools, possibly because they are unhappy with the level of automation implemented in their organization’s …
![Microsoft Defender 365](https://img.helpnetsecurity.com/wp-content/uploads/2023/02/24140855/microsoft-365-defender-400x200.jpg)
Microsoft announces automatic BEC, ransomware attack disruption capabilities
Last year, Microsoft announced automatic attack disruption capabilities in Microsoft 365 Defender, its enterprise defense suite. On Wednesday, it announced that these …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
4 key shifts in the breach and attack simulation (BAS) market
The increase in the number of attack surfaces along with the rise in cybercriminal sophistication is generating technical debt for security operations centers (SOCs), many of …
![Troy Fine](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/07113458/troy_fine-2-drata-400x200.jpg)
Busting compliance myths
In this interview for Help Net Security, Troy Fine, Senior Manager of Cybersecurity Risk Management at Drata, talks about the challenges of data compliance and what companies …
![Approved](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/26115043/gears-shield-approved-400x200.jpg)
Delivering visibility requires a new approach for SecOps
As the world watches the conflict with Russia unfold, cybersecurity defenders are working overtime. Defenders are being asked by key stakeholders, boards, and even CISA for …
![Nathan Hunstad](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/30110529/nathan_hunstad-2-code42-400x200.png)
To avoid insider threats, try empathy
In this interview with Help Net Security, Nathan Hunstad, Deputy CISO at Code42, explains the importance of addressing insider threats, how to make sure your employees are …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094816/insider_threat-400x200.jpg)
What do SOC analysts need to be successful?
Gurucul announced the results of a Black Hat USA 2022 security professionals survey with respondents indicating that insider threats were the most difficult type of attack for …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD