automation
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101944/genai2-400x200.jpg)
16% of organizations experience disruptions due to insufficient AI maturity
While sysadmins recognize AI’s potential, significant gaps in education, cautious organizational adoption, and insufficient AI maturity hinder widespread implementation, …
![Karthik Swarnam](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/18114127/karthik_swarnam-2-armorcode-400x200.webp)
Cybersecurity ROI: Top metrics and KPIs
In this Help Net Security interview, Karthik Swarnam, Chief Security and Trust Officer at ArmorCode, discusses key metrics and KPIs to measure cybersecurity ROI. Swarnam …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12090833/vulnerability-bug-400x200.jpg)
AI accelerates code development faster than security teams can keep up
91% of respondents say their security budget is increasing this year, demonstrating a growing recognition of the importance of cybersecurity within organizations, according to …
![Shuffle Automation](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/10135440/shuffle_automation-1500-400x200.webp)
Shuffle Automation: Open-source security automation platform
Shuffle is an open-source automation platform designed by and for security professionals. While security operations are inherently complex, Shuffle simplifies the process. …
![Koma Gandy](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21124723/koma_gandy-2-skillsoft-400x200.webp)
Exploring the root causes of the cybersecurity skills gap
In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of the cybersecurity skills gap, the need for …
![Martin Reynolds](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17135838/martin_reynolds-2-harness-400x200.webp)
Maintaining human oversight in AI-enhanced software development
In this Help Net Security interview, Martin Reynolds, Field CTO at Harness, discusses how AI can enhance the security of software development and deployment. However, …
![Lingping Gao](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/26112005/lingping_gao-2-netbrain-400x200.webp)
Leveraging no-code automation for efficient network operations
In this Help Net Security interview, Lingping Gao, CEO at NetBrain, discusses the challenges NetOps teams face in maintaining production services due to outdated processes and …
![Michelle Weston](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/07131207/michelle_weston-2-kyndryl-400x200.webp)
Leveraging AI and automation for enhanced security operations
In this Help Net Security interview, Michelle Weston, VP of Security & Resiliency at Kyndryl, discusses the key challenges in security operations and how to address them. …
![quantum computing](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17145137/quantum_computing-1500-1-400x200.webp)
Preparing for a post-quantum future
Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/27142028/genai-2-1500-400x200.webp)
42% plan to use API security for AI data protection
While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices, according to F5. Data and the systems …
![Vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/17164813/vulnerability-1500-1-400x200.webp)
AI’s role in accelerating vulnerability management
With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In the field of vulnerability management …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16113038/strategy-1400-2-400x200.jpg)
Why CISOs need to build cyber fault tolerance into their business
CISOs who elevate response and recovery to equal status with prevention are generating more value than those who adhere to outdated zero tolerance for failure mindsets, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege