Help Net Security
![executive](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171247/executive-400x200.jpg)
The CISO’s approach to AI: Balancing transformation with trust
As organizations increasingly adopt third-party AI tools to streamline operations and gain a competitive edge, they also invite a host of new risks. Many companies are …
![cyber insurance](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26141847/cyber-insurance-400x200.jpg)
Cyber insurance 2.0: The systemic changes required for future security
Digitalization has evolved into a systemic risk for organizations – and, therefore, cyber insurers. With the global cost of cybercrime skyrocketing, something has to change. …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171231/malware-400x200.jpg)
Ad-injecting malware posing as DwAdsafe ad blocker uses Microsoft-signed driver
ESET Research has discovered a sophisticated Chinese browser injector: a signed, vulnerable, ad-injecting driver from a mysterious Chinese company. This threat, which ESET …
![cybersecurity week in review](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25124834/cybersecurity-week-review-3-1500-400x200.webp)
Week in review: CrowdStrike update causes widespread IT outage, critical Splunk Enterprise flaw
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Faulty CrowdStrike update takes out Windows machines worldwide Thousands and …
![networking](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/18155333/networking-400x200.jpg)
GenAI network acceleration requires prior WAN optimization
As GenAI models used for natural language processing, image generation, and other complex tasks often rely on large datasets that must be transmitted between distributed …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/21083820/software-1500-2-400x200.webp)
One-third of dev professionals unfamiliar with secure coding practices
Attackers consistently discover and exploit software vulnerabilities, highlighting the increasing importance of robust software security, according to OpenSSF and the Linux …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23151629/plan-governance-400x200.jpg)
CISOs must shift from tactical defense to strategic leadership
Cyber threats are advancing quickly in size and sophistication, largely because of the rapid evolution of technology, increasing sophistication of cyber attackers, and the …
![Infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/28091843/infosec-week-1200-400x200.webp)
New infosec products of the week: July 19, 2024
Here’s a look at the most interesting products from the past week, featuring releases from AuditBoard, BlueVoyant, Druva, Invicti Security, and Rezonate. AuditBoard’s …
![ebook CISSP career](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/18145313/cissp_career_isc2-400x200.webp)
eBook: How CISSP turns career goals into reality
CISSP carries clout. As the world’s leading cybersecurity certification, it opens many professional opportunities worldwide. Find out what led 14 successful CISSPs around the …
![digital identity](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20132920/digital_identity1-400x200.jpg)
Fighting AI-powered synthetic ID fraud with AI
Aided by the emergence of generative artificial intelligence models, synthetic identity fraud has skyrocketed, and now accounts for a staggering 85% of all identity fraud …
![Grype](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152010/grype-scanner-1500-400x200.webp)
Grype: Open-source vulnerability scanner for container images, filesystems
Grype is an open-source vulnerability scanner designed for container images and filesystems that seamlessly integrates with Syft, a powerful Software Bill of Materials (SBOM) …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/12155822/cloud-security-400x200.webp)
Signatures should become cloud security history
It’s becoming evident that the legacy practice of signature-based threat detection needs to be improved for cloud security challenges. In this Help Net Security video, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege