![Patrice Auffret](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/23112810/patrice_auffret-2-onyphe-400x200.jpg)
What makes a good ASM solution stand out
In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that …
![database](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151902/database-400x200.jpg)
Is the cybersecurity community’s obsession with compliance counter-productive?
Does anyone think the chances of surviving a plane crash increase if our tray tables are locked and our carry-on bags are completely stowed under our seats? That we’ll be OK …
![cybersecurity search engines](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/23094701/cybersecurity_search_engines-1400-400x200.jpg)
11 search engines for cybersecurity research you can use right now
Staying ahead in cybersecurity requires constant learning and adaptation. If you’re interested in cybersecurity research, explore the resources outlined below. …
![SaaS](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27135719/saas-400x200.jpg)
IT leaders alarmed by generative AI’s SaaS security implications
IT leaders are grappling with anxiety over the risks of generative AI despite continued confidence in their software-as-a-service (SaaS) security posture, according to Snow …
![Kroll](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/28115256/kroll-1400-400x200.jpg)
Kroll SIM-swap attack: FTX, BlockFi and Genesis clients’ info exposed
Financial and risk advisory firm Kroll has suffered a SIM-swapping attack that allowed a threat actor to access files containing personal information of clients of bankrupt …
![Juniper Networks](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105404/Juniper_Networks-1-400x200.jpg)
PoC for no-auth RCE on Juniper firewalls released
Researchers have released additional details about the recently patched four vulnerabilities affecting Juniper Networks’ SRX firewalls and EX switches that could allow …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093146/robot-400x200.jpg)
Uncovering a privacy-preserving approach to machine learning
In the era of data-driven decision making, businesses are harnessing the power of machine learning (ML) to unlock valuable insights, gain operational efficiencies, and …
![Florian Forster](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131036/florian_forster-2-zitadel-400x200.jpg)
Adapting authentication to a cloud-centric landscape
In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142723/cloudfiles1-400x200.jpg)
Experts demand clarity as they struggle with cloud security prioritization
Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of comprehensively …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160742/llms-3-400x200.jpg)
Customizing LLMs for domain-specific tasks
The expansion of large language models (LLMs) in recent times has brought about a revolutionary change in machine learning processes and has introduced fresh perspectives on …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/16184227/week-in-review-400x200.jpg)
Week in review: Security Onion 2.4 released, WinRAR vulnerable to RCE
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Network detection and response in the modern era In this Help Net Security …
![North Korea](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/21143809/north_korea-400x200.jpg)
Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure
North Korean state-sponsored hackers Lazarus Group have been exploiting a ManageEngine ServiceDesk vulnerability (CVE-2022-47966) to target internet backbone infrastructure …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history