Please turn on your JavaScript for this page to function normally.

Artificial intelligence

Wayman Cummings
Building a healthcare cybersecurity strategy that works

In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He …

attack
Attackers don’t linger, they strike and move on

Cyber attacks are happening faster than ever. Intrusions that once took weeks or months now unfold in minutes, leaving little time to react. Attackers move quickly once they …

data analytics
Your SOC is tired, AI isn’t

Security teams have discussed AI in the SOC for years, but solid evidence of its impact has been limited. A recent benchmark study by Dropzone puts measurable evidence behind …

Jess Vachon
Behind the screens: Building security customers appreciate

In this Help Net Security interview, Jess Vachon, CISO at PRA Group, discusses the company’s multi-layered defense against fraud and its commitment to protecting customer …

centralized security space
Rethinking AI security architectures beyond Earth

If you think managing cloud security is complex, try doing it across hundreds of satellites orbiting the planet. Each one is a moving endpoint that must stay secure while …

world map
Cybersecurity’s next test: AI, quantum, and geopolitics

Geopolitics, emerging technology, and skills shortages are reshaping cybersecurity priorities across industries, according to a new PwC report. The findings show a mix of …

key
Old authentication habits die hard

Many organizations still rely on weak authentication methods while workers’ personal habits create additional risks, according to Yubico. Training and policy gaps 40% of …

Brain
When loading a model means loading an attacker

You probably think twice before downloading a random app or opening an unfamiliar email attachment. But how often do you stop to consider what happens when your team downloads …

AI
Protegrity Developer Edition: Free containerized Python package to secure AI pipelines

Protegrity Developer Edition enables developers, data scientists, ML engineers, and security teams an easy way to add data protection into GenAI and unstructured data …

AI
AI hype hits a wall when the data doesn’t deliver

Companies are pouring money into AI for IT operations, but most projects are still far from maturity. A global survey of 1,200 business leaders, IT leaders, and technical …

LLM
GPT needs to be rewired for security

LLMs and agentic systems already shine at everyday productivity, including transcribing and summarizing meetings, extracting action items, prioritizing critical emails, and …

strategy
Underwriting is shifting to AI-driven, real-time decisions by 2030

Underwriting is undergoing a major transformation as financial institutions push for faster decisions, better fraud detection, and greater personalization, according to a new …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools