Please turn on your JavaScript for this page to function normally.
compliance
Keeping control in complex regulatory environments

Modern compliance programs represent a strategic shift in how companies approach regulatory and ethical obligations. They are designed to not only mitigate risks and avoid …

irreducibly complex systems book
Introducing the book: Irreducibly Complex Systems

In this Help Net Security video interview, David Hunt, CTO at Prelude, discusses his book – Irreducibly Complex Systems: An Introduction to Continuous Security Testing. …

data analytics
How cyber fusion is helping enterprises modernize security operations

In this Help Net Security video, Avkash Kathiriya, Sr. VP – Research and Innovation at Cyware, explains how cyber fusion is helping enterprises modernize their security …

network
Why security is the bedrock of success for mainframe projects

Enterprises looking to update their mission-critical operations are approaching modernization in three ways – modernizing on the mainframe, integrating with the …

connected car
Automotive cybersecurity: A decade of progress and challenges

As connected cars become a standard feature in the market, the significance of automotive cybersecurity rises, playing an essential role in ensuring the safety of road users. …

cyber insurance
Cyber insurance costs pressure business budgets

Cyber insurance is a type of insurance policy that provides financial protection and support to individuals and organizations in the event of cyber incidents, including data …

connected
Are executives adequately guarding their gadgets?

Today, individual citizens, rather than businesses or governmental bodies, are the main entry points for cyberattacks. However, security solutions haven’t evolved …

data analytics
High-business-impact outages are incredibly expensive

In this Help Net Security video, Peter Pezaris, Chief Strategy and Design Officer at New Relic, discusses observability adoption and how full-stack observability leads to …

large language models
Understanding the layers of LLM security for business integration

In this Help Net Security video, Ivana Bartoletti, Global Privacy Officer at Wipro, discusses how organizations should deal with and deploy LLMs securely. Those who push the …

laptop
GenAI in software surges despite risks

In this Help Net Security video, Ilkka Turunen, Field CTO at Sonatype, discusses how generative AI influences and impacts software engineers’ work and the software …

keyboard
Protecting against FraudGPT, ChatGPT’s evil twin

FraudGPT is the evil counterpart to ChatGPT. Criminals use it to target businesses with phishing emails and scams with speed and accuracy like never before. The AI can be …

online fraud
Online fraud can cost you more than money

Online fraud is a pervasive and constantly evolving threat that affects individuals and organizations worldwide. Online fraudsters often leverage the anonymity and convenience …

Don't miss

Cybersecurity news