Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
artificial intelligence
3 ways to strike the right balance with generative AI

To find the sweet spot where innovation doesn’t mean sacrificing your security posture, organizations should consider the following three best practices when leveraging AI. …

identity theft
How cybercriminals use look-alike domains to impersonate brands

Cybercriminals create hundreds of thousands of counterfeit domains that mimic well-known brands for financial gain. These fake domains serve multiple malicious purposes, such …

Slava Bronfman
Shifting left and right, innovating product security

In this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, …

CISO
Cybersecurity pros battle discontent amid skills shortage

The cybersecurity skills crisis continues in a multi-year freefall that has impacted 71% of organizations and left two-thirds of cybersecurity professionals stating that the …

BYOD
Baseline standards for BYOD access requirements

49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how …

HNS
Insight Managed Cloud Services streamline cloud management

Insight Enterprises has expanded its services portfolio with a new global managed cloud offering to simplify how enterprises scale their cloud use. Insight Managed Cloud …

HNS
CyberSaint launches Remediation Suite to optimize resource allocation and decision-making

CyberSaint has launched the Remediation Suite within the CyberStrong platform. With the Remediation Suite, CISOs and cyber risk professionals gain access to a toolkit to …

HNS
D2iQ DKP 2.6 improves Kubernetes management capabilities

D2iQ announced the newest updates to its multi-cluster Kubernetes management platform, D2iQ Kubernetes Platform (DKP). DKP 2.6 features the new DKP AI Navigator, an AI …

HNS
Netskope acquires Kadiska for enhanced network and app performance monitoring

Netskope has acquired Kadiska. The news follows the announcement last week of enhancements to Netskope’s Digital Experience Management (DEM) capabilities with the introduction …

vulnerabilities
Old vulnerabilities are still a big problem

A recently flagged phishing campaign aimed at delivering the Agent Tesla RAT to unsuspecting users takes advantage of old vulnerabilities in Microsoft Office that allow remote …

HNS
TXOne Networks Edge V2 isolates security breaches

TXOne Networks announced the second generation of its Edge engine for eliminating the spread of operational technology (OT) network infections and safeguarding reliable …

MSSQL
Cybercriminals target MS SQL servers to deliver ransomware

A cyberattack campaign is targeting exposed Microsoft SQL (MS SQL) databases, aiming to deliver ransomware and Cobalt Strike payloads. The attack campaign The attackers target …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools