
Cybersecurity posture validation: Fireside chat with Arkadiy Goykhberg, CISO of DMGT
Working in cyber security is an exciting if humbling experience. It is a discipline where you can never have enough details, best practices, and lessons learned by examining …

We cannot afford for healthcare security to be the “lowest-hanging fruit”
Healthcare organizations have never been more essential. Yet when it comes to cybersecurity, too many hospitals, medical groups and research centers lag far behind other …

The complexities of vulnerability remediation and proactive patching
In this interview with Help Net Security, Eran Livne, Director, Product Management, Endpoint Remediation at Qualys, discusses vulnerability remediation complexity, the …

Industry trends and insights of CISOs around the world
Marlin Hawk released a research report which explores industry trends and insights of CISOs around the world, the challenges they face in the cybersecurity landscape, as well …

IT teams forced into compromising security for business continuity during pandemic
IT teams have been forced into compromising security for business continuity at a time of rising threats, a HP report reveals. Making matters worse, their attempts to increase …

Ransomware attacks: The power of adaptation
The pandemic has had a major impact on almost every aspect of our society and left many organizations susceptible to increasingly sophisticated ransomware attacks. In this …

Critical infrastructure today: Complex challenges and rising threats
Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity …

Using zero trust to mitigate 5G security challenges
The total number of 5G connections will reach 3.2 billion by 2026, rising from 310 million in 2021, a study from Juniper Research has found. 45% of operators consider it …

Getting ahead of a major blind spot for CISOs: Third-party risk
For many CISOs and security leaders, it was not long ago that their remit focused on the networks and digital ecosystems for their organization alone. In today’s digital …

Why companies should never hack back
After major cyberattacks on the Colonial Pipeline and on meat supplier JBS, the idea of allowing companies to launch cyberattacks back at cyber criminals was proposed. This …

Cyber threats, passenger vessels and superyachts: The current state of play
In this interview with Help Net Security, Peter Broadhurst, Maritime Senior VP Safety, Security, Yachting and Passenger, Inmarsat, talks about the impact of cyber threats on …

Operationalize AWS security responsibilities in the cloud
In a sea of available MSSPs, organizations can find it hard to choose the one that can offer the right cloud security expertise. To make this decision easier, AWS has …
Featured news
Resources
Don't miss
- Digital sovereignty becomes a matter of resilience for Europe
- Storm-2603 spotted deploying ransomware on exploited SharePoint servers
- CISO New York 2025 brings together top cybersecurity leaders
- Sonicwall fixes critical flaw in SMA appliances, urges customers to check for compromise (CVE-2025-40599)
- Autoswagger: Open-source tool to expose hidden API authorization flaws