Please turn on your JavaScript for this page to function normally.
Help Net Security
Ready1 for Identity Crisis Management restores operations after identity breaches

Semperis released Ready1 for Identity Crisis Management, which combines its Active Directory Forest Recovery (ADFR), Disaster Recovery for Entra Tenant (DRET), and Identity …

people
Turning the human factor into your strongest cybersecurity defense

In this Help Net Security video, Jacob Martens, Field CISO at Upwind Security, explores one of cybersecurity’s most enduring challenges: the human factor behind breaches. …

crypto
Outdated encryption leaves crypto wide open

The cryptocurrency sector faces an existential threat on two fronts: none of the 2,138 web applications and 146 mobile apps tested by ImmuniWeb support post-quantum …

Enzoic eBook Defending Identity
eBook: Defending Identity Security the Moment It’s Threatened

Credential-based attacks happen in seconds. Learn how to block weak or stolen passwords instantly, safeguard accounts in real time, and reduce helpdesk headaches with …

week in review
Week in review: Many Cisco ASA firewalls still unsecure, hackers claim Red Hat’s GitLab breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How to protect the global cable network The …

AI
Protegrity Developer Edition: Free containerized Python package to secure AI pipelines

Protegrity Developer Edition enables developers, data scientists, ML engineers, and security teams an easy way to add data protection into GenAI and unstructured data …

data analytics
4 ways to use time to level up your security monitoring

SIEMs excel at correlating events and firing alerts, but their ingest pipelines can get overwhelmed when scaled. And because most SIEMs rely on general-purpose log storage …

LLM
GPT needs to be rewired for security

LLMs and agentic systems already shine at everyday productivity, including transcribing and summarizing meetings, extracting action items, prioritizing critical emails, and …

risk
How to stop a single vendor breach from taking down your business

In this Help Net Security video, William Dixon, Senior Executive at Intel 471, examines the future of third-party cyber risk and why it is a growing concern for organizations …

Picus webinar BAS Summit 2025
Webinar: The BAS Summit 2025: Redefining Attack Simulation through AI

Join Picus Security, SANS, Hacker Valley, and leading CISOs at The BAS Summit 2025 to learn how AI is redefining Breach and Attack Simulation (BAS) and why it’s becoming the …

AI
How attackers poison AI tools and defenses

Cyberattackers are using generative AI to draft polished spam, create malicious code and write persuasive phishing lures. They are also learning how to turn AI systems …

CISO
The CISO’s guide to stronger board communication

In this Help Net Security video, Alisdair Faulkner, CEO of Darwinium, explores how the role of the CISO has changed over the past decade. Faulkner shares insights on how CISOs …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools