training
![Koma Gandy](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21124723/koma_gandy-2-skillsoft-400x200.webp)
Exploring the root causes of the cybersecurity skills gap
In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of the cybersecurity skills gap, the need for …
![security gamification](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/03150111/security_gamification-400x200.webp)
6 tips to implement security gamification effectively
There’s not a CISO in the industry who’s not aware of the extremely short median CISO tenure. That’s why the best CISOs are those who constantly seek ways to strengthen their …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/12153721/genai-1500-400x200.webp)
GenAI can enhance security awareness training
One of the biggest concerns over generative AI is its ability to manipulate us, which makes it ideal for orchestrating social engineering attacks. From mining someone’s …
![Caleb Sima](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/04125142/caleb_sima-2-cloud_security_alliance-400x200.webp)
AI set to enhance cybersecurity roles, not replace them
In this Help Net Security interview, Caleb Sima, Chair of CSA AI Security Alliance, discusses how AI empowers security pros, emphasizing its role in enhancing skills and …
![SaaS](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/29114736/saas-1400-400x200.jpg)
Understanding employees’ motivations behind risky actions
More 68% of employees knowingly put their organizations at risk, potentially leading to ransomware or malware infections, data breaches, or financial loss, according to …
![mental health](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165903/mental_health-400x200.png)
We can’t risk losing staff to alert fatigue
The oft-quoted Chinese military strategist Sun Tzu famously claimed: “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” Exchange …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151905/software-dev-400x200.jpg)
Unlocking sustainable security practices with secure coding education
Despite stringent regulations and calls for ‘security by design’, organizations are still failing to equip teams with the knowledge to secure code, according to Security …
![government cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/09102406/government_cybersecurity-1400-400x200.jpg)
Government organizations’ readiness in the face of cyber threats
Cyber threats targeting government organizations have become increasingly sophisticated, posing significant risks to national security, public infrastructure, and sensitive …
![work](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20081204/computer_skills-400x200.jpg)
Tech workers fear being left unprepared for the future
While tech workers want to learn and organizations are spending thousands of dollars per employee on learning technology, it is not translating into improved on-the-job …
![black friday cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/15211911/black-friday-cybersecurity-400x200.jpg)
9 Black Friday cybersecurity deals you don’t want to miss
PortDroid PortDroid is a trusted app for all network analysis tasks. Designed with network administrators, penetration testers, and technology enthusiasts in mind, this app …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/16115933/marko_gulan-2-schneider_electric-400x200.jpg)
Collaborative strategies are key to enhanced ICS security
In this Help Net Security interview, Marko Gulan, Cyber Security Consultant at Schneider Electric, discusses the complexities of safeguarding industrial control systems (ICS). …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094415/money-1-400x200.jpg)
Financial organizations embrace automation for enhanced security
The security performance of financial applications generally outperforms other industries, with automation, targeted security training, and scanning via Application …