![James Murphy](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/29131628/james_murphy-2-techvets-400x200.jpg)
Turning military veterans into cybersecurity experts
In this Help Net Security interview, James Murphy, the Director of the TechVets Programme at the Forces Employment Charity and member of Fortinet’s Veterans Program …
![connected car](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/01095643/connected_car-400x200.jpg)
Automotive cybersecurity: A decade of progress and challenges
As connected cars become a standard feature in the market, the significance of automotive cybersecurity rises, playing an essential role in ensuring the safety of road users. …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093732/phishing2-400x200.jpg)
LLMs lower the barrier for entry into cybercrime
Cybercriminals employ evolving attack methodologies designed to breach traditional perimeter security, including secure email gateways, according to Egress. “Without a doubt …
![Adam Pennington](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/11112133/adam_pennington-2-mitre-400x200.jpg)
MITRE ATT&CK project leader on why the framework remains vital for cybersecurity pros
MITRE ATT&CK, a common language for cybersecurity professionals to communicate with each other and better understand real-world adversary behaviors, celebrates its 10th …
![computer](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/25163441/computer-1-400x200.jpg)
Balancing cybersecurity with convenience and progress
Changing approaches to cybersecurity have led to slow but steady progress in defense and protection. Still, competing interests create a growing challenge for cybersecurity …
![industrial equipment](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/18140402/industrial-equipment-manufacturers-security-400x200.jpg)
Regulatory pressure complicates cybersecurity for industrial equipment manufacturers
50% of companies lack a dedicated security function for control systems and devices within their organizational structure, according to Cybellum. Security incidents involving …
![Darren Sankbeil](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/12135753/darren_sankbeil-2-dragos-400x200.jpg)
Industrial cybersecurity giant Dragos rakes in new funding, sets sights on global expansion
Today, Dragos revealed that it has secured a $74 million Series D extension funding round, spearheaded by the strategic operating and investment firm WestCap. The funding …
![Pete Hoff](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/04131356/pete_hoff-2-wursta-400x200.jpg)
How should SMBs navigate the phishing minefield?
In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on how to minimize the threat phishing presents to …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145259/laptop-ai-400x200.png)
3 ways to strike the right balance with generative AI
To find the sweet spot where innovation doesn’t mean sacrificing your security posture, organizations should consider the following three best practices when leveraging AI. …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171242/ransomware-1-400x200.jpg)
Ransomware dwell time hits new low
Median attacker dwell time—the time from when an attack starts to when it’s detected—shrunk from 10 to eight days for all attacks, and to five days for ransomware attacks …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19153210/email-400x200.jpg)
Cybercriminals turn to AI to bypass modern email security measures
Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security …
![kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/13214620/kubernetes-logo-400x200.jpg)
Kubernetes clusters face widespread attacks across numerous organizations
In this Help Net Security video, Assaf Morag, Lead Threat Intelligence Analyst at Aqua Security, discusses research that discovered openly accessible and unprotected …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD