Please turn on your JavaScript for this page to function normally.
Kai Roer
How human behavior research informs security strategies

In this Help Net Security interview, Kai Roer, CEO at Praxis Security Labs, explores the theoretical underpinnings, practical implications, and the crucial role of human …

Alex Ionescu
From Windows 9x to 11: Tracing Microsoft’s security evolution

Over its journey from Windows 9x to Windows 11, Microsoft has implemented multiple security overhauls, each addressing the challenges of its time and setting the stage for …

White House AI
White House issues Executive Order for safe, secure, and trustworthy AI

President Biden issued a landmark Executive Order to ensure that America leads the way in seizing the promise and managing the risks of artificial intelligence (AI). New …

ransomware
Companies scramble to integrate immediate recovery into ransomware plans

More than one-third of companies still do not have a well-rounded, holistic ransomware strategy in place, according to Zerto. Immediate recovery crucial for businesses’ …

lock
Strategies to overcome cybersecurity misconceptions

Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net …

OT
Scaling rapidly? Your application security strategies need to keep up

Modern application security strategies must support and enable modern software development, even as it rapidly scales, according to Mend.io. Just 52% of companies can …

Brent Deterding
The real impact of the cybersecurity poverty line on small organizations

The financial constraints many smaller organizations face often cast shadows on their ability to fortify defenses. In this Help Net Security interview, Brent Deterding, CISO …

Healthcare IoT
Addressing cyber threats in healthcare operational technology

The proliferation of connected medical devices (IoMT) in hospitals demands a holistic approach to cybersecurity beyond just the digital IT realm. Industrial cybersecurity (OT) …

data analytics
Cyber resilience starts in the C-suite

In many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives — only 33% of CEOs or managing …

James A. Winnefeld Jr.
The evolution of deception tactics from traditional to cyber warfare

Admiral James A. Winnefeld, USN (Ret.), is the former vice chairman of the Joint Chiefs of Staff and is an advisor to Acalvio Technologies. In this Help Net Security …

cybersecurity cheat sheets
10 essential cybersecurity cheat sheets available for free

Cheat sheets are concise, to-the-point references tailored for instant insights. This article provides a curated list of 10 essential cybersecurity cheat sheets, all free to …

data analytics
SMBs seek help as cyber threats reach an all-time high

Understanding the evolving threat landscape is the biggest cybersecurity challenge facing SMBs, including non-for-profit organizations – and more than half are calling for …

Don't miss

Cybersecurity news