Please turn on your JavaScript for this page to function normally.
The Ultimate Cybersecurity Careers Guide
A closer look at The Ultimate Cybersecurity Careers Guide

In this Help Net Security interview, Kim Crawley, cybersecurity expert and Professor at the Open Institute of Technology, discusses her latest book, The Ultimate Cybersecurity …

cyber insurance
Cyber insurance isn’t always what it seems

Many companies think cyber insurance will protect them from financial losses after an attack. But many policies have gaps. Some claims get denied. Others cover less than …

dark web
How does your data end up on the dark web?

The dark web is a hidden corner of the internet where people can remain anonymous. It’s often confused with the deep web, but they’re not quite the same thing. The deep web is …

The Developer's Playbook for Large Language Model Security
Review: The Developer’s Playbook for Large Language Model Security

With the adoption of large language models (LLMs) across industries, security teams often play catch-up. Many organizations are integrating GenAI into customer interactions, …

protecting personal information
Protecting your personal information from data brokers

How aware are you that your personal information could be bought and sold without your consent—and that there are companies whose entire business model revolves around this? …

Apple UK
Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access the encrypted data, which remains secure …

Cybersecurity Tabletop Exercises
Review: Cybersecurity Tabletop Exercises

Packed with real-world case studies and practical examples, Cybersecurity Tabletop Exercises offers insights into how organizations have successfully leveraged tabletop …

CISO worry
Top 5 threats keeping CISOs up at night in 2025

Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing …

healthcare
CISOs, are your medical devices secure? Attackers are watching closely

The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has …

burnout
Burnout in cybersecurity: How CISOs can protect their teams (and themselves)

Cybersecurity is a high-stakes, high-pressure field in which CISOs and their teams constantly battle threats, compliance requirements, and business expectations. The demand …

attacks
Defending against EDR bypass attacks

EDR bypass and killer attacks are surging, yet many organizations continue to overlook this threat while they have become over-reliant on this security tool – …

Artificial intelligence
How to spot and avoid AI-generated scams

As AI technology advances, cybercriminals create more personalized and convincing scams. This includes mimicking voices, deepfake videos, and highly convincing phishing emails …

Don't miss

Cybersecurity news