Please turn on your JavaScript for this page to function normally.
Dana Wang
Establishing a security baseline for open source projects

In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) …

reNgine
reNgine: Open-source automated reconnaissance framework for web applications

reNgine is an open-source automated reconnaissance framework for web applications that focuses on a highly configurable and streamlined recon process. Developing reNgine …

Tracecat
Tracecat: Open-source SOAR

Tracecat is an open-source automation platform for security teams. The developers believe security automation should be accessible to everyone, especially understaffed small- …

GenAI
Security analysts believe more than half of tasks could be automated

Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. AI …

Debby Briggs
Strategies to cultivate collaboration between NetOps and SecOps

In this Help Net Security interview, Debby Briggs, CISO at Netscout, discusses breaking down silos between NetOps and SecOps. Practical steps include scheduling strategy …

certificates
How Google’s 90-day TLS certificate validity proposal will affect enterprises

Announced last year, Google’s proposal to reduce the lifespan of TLS (transport layer security) certificates from 13 months to 90 days could be implemented in the near future. …

software
Six steps for security and compliance in AI-enabled low-code/no-code development

AI is quickly transforming how individuals create their own apps, copilots, and automations. This is enabling organizations to improve output and increase efficiency—all …

AI forensics
Why AI forensics matters now

In this Help Net Security video, Sylvia Acevedo, who serves on the Boards of Qualcomm and Credo, discusses why companies should invest in forensic capabilities and why …

face
AI weaponization becomes a hot topic on underground forums

The majority of cyberattacks against organizations are perpetrated via social engineering of employees, and criminals are using new methods including AI to supercharge their …

insider threat
Security best practices for GRC teams

Even with the best-of-the-best tools and tech stack monitoring vulnerabilities, every security executive and GRC leader should still have some layer of paranoia. If they …

certificates
Why is everyone talking about certificate automation?

Digital Certificates are not new. In this Help Net Security video, Andreas Brix, Senior Program Manager at GlobalSign, discusses why they are back in the news and what you …

puzzle
How teams can improve incident recovery time to minimize damages

With breach recovery costs skyrocketing, speeding time to recovery to minimize downtime and losses should be top of mind for security leaders. Yet, most focus on adding more …

Don't miss

Cybersecurity news