Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Michael Green
Finding connection and resilience as a CISO

With sensitive information to protect and reputational risk always in the background, it isn’t easy for security leaders to have open conversations about what’s working and …

ScamAgent
ScamAgent shows how AI could power the next wave of scam calls

Scam calls have long been a problem for consumers and enterprises, but a new study suggests they may soon get an upgrade. Instead of a human scammer on the other end of the …

Andrew Hillier
Where security, DevOps, and data science finally meet on AI strategy

AI infrastructure is expensive, complex, and often caught between competing priorities. On one side, security teams want strong isolation and boundaries. On the other, …

Can AI make threat intelligence easier?
Can AI make threat intelligence easier? One platform thinks so

When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t sustainable. They were manually tracking …

AI Security Map
AI Security Map: Linking AI vulnerabilities to real-world impact

A single prompt injection in a customer-facing chatbot can leak sensitive data, damage trust, and draw regulatory scrutiny in hours. The technical breach is only the first …

Matt Hillary
How compliance teams can turn AI risk into opportunity

AI is moving faster than regulation, and that creates opportunities and risks for compliance teams. While governments work on new rules, businesses cannot sit back and wait. …

Carl Kubalsky
Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO

Agriculture is a connected, software-driven industry where cybersecurity is just as essential as tractors and harvesters. From embedded hardware in smart fleets to defending …

Integrating LLMs into IoT networks
LLMs at the edge: Rethinking how IoT devices talk and act

Anyone who has set up a smart home knows the routine: one app to dim the lights, another to adjust the thermostat, and a voice assistant that only understands exact phrasing. …

insider threat
Why a new AI tool could change how we test insider threat defenses

Insider threats are among the hardest attacks to detect because they come from people who already have legitimate access. Security teams know the risk well, but they often …

Brett Loubert
Why satellite cybersecurity threats matter to everyone

Satellites play a huge role in our daily lives, supporting everything from global communications to navigation, business, and national security. As space becomes more crowded …

Adversarial AI Attacks review
Review: Adversarial AI Attacks, Mitigations, and Defense Strategies

Adversarial AI Attacks, Mitigations, and Defense Strategies shows how AI systems can be attacked and how defenders can prepare. It’s essentially a walkthrough of …

LLMs IR
Using lightweight LLMs to cut incident response times and reduce hallucinations

Researchers from the University of Melbourne and Imperial College London have developed a method for using LLMs to improve incident response planning with a focus on reducing …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools