Please turn on your JavaScript for this page to function normally.
servers
Surviving the “quantum apocalypse” with fully homomorphic encryption

In the past few years, an increasing number of tech companies, organizations, and even governments have been working on one of the next big things in the tech world: …

certificates
Why is everyone talking about certificate automation?

Digital Certificates are not new. In this Help Net Security video, Andreas Brix, Senior Program Manager at GlobalSign, discusses why they are back in the news and what you …

Pedro Cameirão
Outsmarting cybercriminal innovation with strategies for enterprise resilience

In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on …

industry
Public anxiety mounts over critical infrastructure resilience to cyber attacks

With temporary failures of critical infrastructure on the rise in the recent years, 81% of US residents are worried about how secure critical infrastructure may be, according …

AI
Harnessing the power of privacy-enhancing tech for safer AI adoption

A consensus on regulatory AI frameworks seems distant. Yet, the imperative for secure and responsible AI deployment cannot be overstated. How can leaders proactively address …

GenAI
The dark side of GenAI

Beyond traditional AI models, generative AI (GenAI) can create new content, images, and even entire scenarios from scratch. While this technology holds immense promise across …

MITRE ATT&CK
Key MITRE ATT&CK techniques used by cyber attackers

While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy …

GitHub
90% of exposed secrets on GitHub remain active for at least five days

12.8 million new secrets occurrences were leaked publicly on GitHub in 2023, +28% compared to 2022, according to GitGuardian. Remarkably, the incidence of publicly exposed …

cyber threat
Human risk factors remain outside of cybersecurity pros’ control

Cyber threats are growing at an unprecedented pace, and the year ahead is fraught with cybercrime and incidents anticipated ahead of the busy election year where over 50 …

artificial intelligence
AI and the future of corporate security

In this Help Net Security video, Tracy Reinhold, CSO at Everbridge, discusses why AI technology must be embraced while also exploring some guardrails that must be in place to …

MobSF: Open-source security research platform for mobile apps

The Mobile Security Framework (MobSF) is an open-source research platform for mobile application security, encompassing Android, iOS, and Windows Mobile. MobSF can be used for …

video healthcare cybersecurity
Only 13% of medical devices support endpoint protection agents

63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) can be found on healthcare networks, while 23% of medical devices—including imaging devices, clinical IoT devices, …

Don't miss

Cybersecurity news