July 2024

Organizations use outdated approaches to secure APIs
Security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used …

Only 13% of organizations are cyber mature
A staggering 83% of organizations have suffered a material security breach recently, with over half occurring in the past year alone, underscoring the critical need for …

Regula Forensic Studio updates improve the accuracy of forensic examinations
Regula has released a significant update to its operating software, Regula Forensic Studio. This major revamp enhances the functionality of forensic devices, improves …

Maintaining human oversight in AI-enhanced software development
In this Help Net Security interview, Martin Reynolds, Field CTO at Harness, discusses how AI can enhance the security of software development and deployment. However, …

Secator: Open-source pentesting Swiss army knife
Secator is an open-source task and workflow runner tailored for security assessments. It facilitates the use of numerous security tools and aims to enhance the efficiency of …

Cybersecurity jobs available right now: July 3, 2024
Some of the jobs listed here are no longer accepting applications. For a fresh list of open cybersecurity jobs, go here. CISO Atera | Israel | On-site – No longer …

Companies spend more on cybersecurity but struggle to track expenses
Most companies do not know how effectively they are investing money to fight the cybersecurity threat, according to Optiv. Cybersecurity budgets are increasing and cyber …

Deepwatch appoints John DiLullo as CEO
Deepwatch announced that John DiLullo has been appointed as CEO, succeeding Charlie Thomas who is retiring and will serve as chairman of the Board of Directors, effective …

NordVPN File Checker protects users from infected files
NordVPN launches its third experimental product from the NordLabs platform. File Checker is an online tool that scans different types of files for malware and viruses. It …

LogRhythm’s enhancements boost analyst efficiency
LogRhythm announced its 9th consecutive quarterly release. In the AI-ready world, LogRhythm empowers security teams with the highest integrity data in the security industry to …

IBM Consulting partners with Microsoft to help clients modernize security operations
IBM Consulting and Microsoft announce strengthened cybersecurity collaboration to help clients simplify and modernize their security operations, and manage and protect their …

Leveraging no-code automation for efficient network operations
In this Help Net Security interview, Lingping Gao, CEO at NetBrain, discusses the challenges NetOps teams face in maintaining production services due to outdated processes and …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains