Please turn on your JavaScript for this page to function normally.
agri-food sector
The food supply chain has a cybersecurity problem

It’s unsettling to think that our food supply chain could be targeted or that the safety of our food could be compromised. But this is exactly the challenge the agri-food …

attack path
Why CISOs should rethink identity risk through attack paths

Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report …

Alisdair Faulkner
Fighting AI with AI: How Darwinium is reshaping fraud defense

AI agents are showing up in more parts of the customer journey, from product discovery to checkout. And fraudsters are also putting them to work, often with alarming success. …

Gonçalo Magalhães
The legal minefield of hacking back

In this Help Net Security interview, Gonçalo Magalhães, Head of Security at Immunefi, discusses the legal and ethical implications of hacking back in cross-border cyber …

Corinium CISO NY 2025
CISO New York 2025 brings together top cybersecurity leaders

The annual CISO New York summit will be held on September 9, 2025, uniting over 150 senior cybersecurity executives for a full day of insight, strategy, and collaboration at …

Aleksandar Stančin
Why outsourcing cybersecurity is rising in the Adriatic region

In this Help Net Security interview, Aleksandar Stančin, Board Member Adriatics, Exclusive Networks, discusses the state of cybersecurity in the Adriatic region. He talks …

maritime
Ports are getting smarter and more hackable

A new policy brief from NATO’s Cooperative Cyber Defence Centre of Excellence (CCDCOE) warns that critical port infrastructure, responsible for 80 percent of global trade, is …

cyber risks
What the law says about your next data breach

In this Help Net Security video, Chad Humphries, Solution Consultant, Networks & Cyber Security at Rockwell Automation, explores how cyber risk quantification is becoming …

keys
Why silent authentication is the smarter way to secure BYOD

In this Help Net Security video, Andy Ulrich, CISO at Vonage, explains how silent authentication offers a smarter, seamless solution to the security and productivity …

cybersecurity surprises 2025
Experts unpack the biggest cybersecurity surprises of 2025

2025 has been a busy year for cybersecurity. From unexpected attacks to new tactics by threat groups, a lot has caught experts off guard. We asked cybersecurity leaders to …

insider threat
Most cybersecurity risk comes from just 10% of employees

A new report from Living Security and the Cyentia Institute sheds light on the real human element behind cybersecurity threats, and it’s not what most organizations expect. …

Gail Hodges
FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare

In this Help Net Security interview, Gail Hodges, Executive Director at the OpenID Foundation, discusses how the Foundation ensures global consistency in FAPI 2.0 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools