Features
![Dana Wang](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/30142104/dana_wang-2-openssf-400x200.webp)
Establishing a security baseline for open source projects
In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) …
![Pukar Hamal](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/02130722/pukar_hamal-2-securitypal-400x200.webp)
Strategies for preventing AI misuse in cybersecurity
As organizations increasingly adopt AI, they face unique challenges in updating AI models to keep pace with evolving threats while ensuring seamless integration into existing …
![CISSP](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/20181231/cissp2-400x200.webp)
How to prepare for the CISSP exam: Tips from industry leaders
The Certified Information Systems Security Professional (CISSP) is the most widely recognized certification in the information security industry. CISSP certifies that an …
![Sophie Stalla-Bourdillon](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/16115259/sophie_stalla_bourdillon-2-immuta-400x200.webp)
Understanding emerging AI and data privacy regulations
In this Help Net Security interview, Sophie Stalla-Bourdillon, Senior Privacy Counsel & Legal Engineer at Immuta, discusses the AI Act, the Data Act, and the Health Data …
![Charly Davis](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/24120005/charly_davis-2-sapphire-400x200.webp)
Making cybersecurity more appealing to women, closing the skills gap
In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women face in the cybersecurity industry. Davis …
![Mike Lemberger](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/15115539/mike_lemberger-2-visa-400x200.webp)
Triangulation fraud: The costly scam hitting online retailers
In this Help Net Security interview, Mike Lemberger, Visa’s SVP, Chief Risk Officer, North America, discusses the severe financial losses resulting from triangulation fraud, …
![Assaf Mischari](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/16121518/assaf_mischari-2-team8-400x200.webp)
Overcoming GenAI challenges in healthcare cybersecurity
In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on …
![Roy Davis](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/15121552/roy_davis-2-zoom-400x200.webp)
How to optimize your bug bounty programs
In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role bug bounty programs play in identifying …
![Keren Elazari](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/15123415/keren_elazari-2-400x200.webp)
Thinking outside the code: How the hacker mindset drives innovation
Keren Elazari is an internationally recognized security analyst, author, and researcher. Since 2000, Keren has worked with leading Israeli security firms, government …
![Caleb Sima](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/04125142/caleb_sima-2-cloud_security_alliance-400x200.webp)
AI set to enhance cybersecurity roles, not replace them
In this Help Net Security interview, Caleb Sima, Chair of CSA AI Security Alliance, discusses how AI empowers security pros, emphasizing its role in enhancing skills and …
![Andrew Ginter](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/03155459/andrew_ginter-2-waterfall_security-400x200.webp)
Geopolitical tensions escalate OT cyber attacks
In this Help Net Security interview, Andrew Ginter, VP of Industrial Security at Waterfall Security, discusses operational technology (OT) cyber attacks and their 2024 Threat …
![Debby Briggs](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/02121153/debby_briggs-2-netscout-400x200.webp)
Strategies to cultivate collaboration between NetOps and SecOps
In this Help Net Security interview, Debby Briggs, CISO at Netscout, discusses breaking down silos between NetOps and SecOps. Practical steps include scheduling strategy …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders