cybersecurity
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101944/genai2-400x200.jpg)
16% of organizations experience disruptions due to insufficient AI maturity
While sysadmins recognize AI’s potential, significant gaps in education, cautious organizational adoption, and insufficient AI maturity hinder widespread implementation, …
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/25170731/mind-business-1500-400x200.webp)
Most CISOs feel unprepared for new compliance regulations
With the new stringent regulations, including the SEC’s cybersecurity disclosure rules in the USA and the Digital Operational Resilience Act (DORA) in the EU, a significant …
![Crowdstrike](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/19130702/crowdstrike-2-1500-400x200.webp)
Learning from CrowdStrike’s quality assurance failures
CrowdStrike has released a preliminary Post Incident Review (PIR) of how the flawed Falcon Sensor update made its way to millions of Windows systems and pushed them into a …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/21112520/identity-id-400x200.webp)
How CISOs enable ITDR approach through the principle of least privilege
Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. …
![Ava Chawla](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/15115019/ava_chawla-2-algosec-400x200.webp)
Cloud security threats CISOs need to know about
In this Help Net Security interview, Ava Chawla, Head of Cloud Security at AlgoSec, discusses the most significant cloud security threats CISOs must be aware of in 2024. These …
![GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/18100102/github-3-1500-400x200.webp)
Researchers expose GitHub Actions workflows as risky and exploitable
GitHub is an immensely popular platform, with over 100 million developers and over 90% of Fortune 100 companies utilizing it. Despite its widespread use, many GitHub Actions …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/12153721/genai-1500-400x200.webp)
The most urgent security risks for GenAI users are all data-related
Regulated data (data that organizations have a legal duty to protect) makes up more than a third of the sensitive data being shared with GenAI applications—presenting a …
![Crowdstrike](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/19183542/crowdstrike-update-400x200.webp)
CrowdStrike blames buggy testing software for disastrous update
A bug in the Content Validator – a software element CrowdStrike relies on for testing and validating Rapid Response Content updates for its Falcon Sensors – is …
![Karthik Swarnam](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/18114127/karthik_swarnam-2-armorcode-400x200.webp)
Cybersecurity ROI: Top metrics and KPIs
In this Help Net Security interview, Karthik Swarnam, Chief Security and Trust Officer at ArmorCode, discusses key metrics and KPIs to measure cybersecurity ROI. Swarnam …
![executive](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171247/executive-400x200.jpg)
The CISO’s approach to AI: Balancing transformation with trust
As organizations increasingly adopt third-party AI tools to streamline operations and gain a competitive edge, they also invite a host of new risks. Many companies are …
![SaaS](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27135719/saas-400x200.jpg)
Despite economic uncertainty, organizations are prioritizing SaaS security investments
In this Help Net Security video, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the key findings of their recent annual SaaS Security Survey Report, conducted in …
![Anand Pashupathy](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/09123752/anand_pashupathy-2-intel-400x200.webp)
Confidential AI: Enabling secure processing of sensitive data
In this Help Net Security interview, Anand Pashupathy, VP & GM, Security Software & Services Division at Intel, explains how Intel’s approach to confidential …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege