Expert analysis
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28143248/privacy1-400x200.jpg)
Risk related to non-human identities: Believe the hype, reject the FUD
The hype surrounding unmanaged and exposed non-human identities (NHIs), or machine-to-machine credentials – such as service accounts, system accounts, certificates and …
![third party](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31195646/third-party2-400x200.webp)
How to design a third-party risk management framework
Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such as third-party networks, which …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/27142024/genai-3-1500-400x200.webp)
How AI helps decode cybercriminal strategies
With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true …
![executives](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/06113627/executives-400x200.jpg)
Diversifying cyber teams to tackle complex threats
Technologies such as GenAI, ML and IoT are giving threat actors new tools that make it easier to target consumers and organizations. From Savvy Seahorse which lures victims …
![microsoft cybersecurity dilemma](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07153226/microsoft_cybersecurity_dilemma-400x200.webp)
Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella
Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with …
![Patch Tuesday](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07160038/patch_tuesday-2024-1-400x200.webp)
July 2024 Patch Tuesday forecast: The end of an AV giant in the US
July 2024 Patch Tuesday is now live: Microsoft fixes two zero-days exploited by attackers (CVE-2024-38080, CVE-2024-38112) The US celebrated Independence Day last week, …
![cyber resilience](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20125121/cyber_resilience-400x200.jpg)
The impossibility of “getting ahead” in cyber defense
As a security professional, it can be tempting to believe that with sufficient resources we can achieve of state of parity, or even relative dominance, over cyber attackers. …
![quantum computing](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29114607/quantum_computing-1400-400x200.jpg)
Preparing for Q-Day as NIST nears approval of PQC standards
Q-Day—the day when a cryptographically relevant quantum computer can break most forms of modern encryption—is fast approaching, leaving the complex systems our societies rely …
![faking data breaches](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21135908/faking_data_breaches-1500-400x200.webp)
Why are threat actors faking data breaches?
Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European car rental company immediately launched an investigation, …
![map](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17112636/map-400x200.webp)
How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams
Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like Google Maps …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/19165750/vulnerability-1400-400x200.jpg)
Low code, high stakes: Addressing SQL injection
Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s. Due to various factors, they remain the third most common source …
![online fraud](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/25200942/online-fraud-400x200.jpg)
Modern fraud detection need not rely on PII
Trends in online fraud detection often act as the canary in the coal mine when it comes to understanding and combating the next generation of online scams, fraud and …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders