Please turn on your JavaScript for this page to function normally.
How to safely dispose of old tech
How to safely dispose of old tech without leaving a security risk

Every year, millions of old tech are thrown away due to age, malfunctions, or to make way for new ones, which creates security risks related to the data on these devices. The …

data breaches
Who’s in your digital house? The truth about third-party access

In this Help Net Security video, Fran Rosch, CEO at Imprivata, discusses organizations’ challenges in securing third-party access and offers valuable insights on how …

executive
AI threats and workforce shortages put pressure on security leaders

In this Help Net Security video, John Grancarich, Fortra’s Chief Strategy Officer, discusses the 2025 Fortra State of Cybersecurity Survey and highlights escalating …

How to prevent data leakage
How to prevent data leakage in collaboration tools like Slack and Teams

In recent years, collaboration tools have become an absolute necessity for remote and hybrid work. This primarily increased during the COVID-19 pandemic due to the …

GenAI
89% of enterprise AI usage is invisible to the organization

Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal …

Vulnerability
The 5 stages of incident response grief

Whether we recognize it or not, anytime an incident occurs, it sets off the grieving process. But grief isn’t a bad thing: it’s how we process our emotional reactions and move …

social media
Scammers take over social media

In Q4 2024, cyber threats reached unprecedented levels, with 2.55 billion attacks blocked, equating to 321 threats every second. In this Help Net Security video, Luis Corrons, …

data analytics
Prioritizing data and identity security in 2025

To say that the cybersecurity landscape has grown more complex over the past several years would be a dramatic understatement. Attackers have more resources at their …

Matthew Darlage
Building cyber resilience in banking: Expert insights on strategy, risk, and regulation

In this Help Net Security interview, Matthew Darlage, CISO at Citizens, discusses key strategies for strengthening cyber resilience in banks. He underlines that adherence to …

CISO CIO
CISO vs. CIO: Where security and IT leadership clash (and how to fix it)

The dynamic between CISOs and CIOs has always been complex. While both roles are essential to an organization’s success, their priorities often put them at odds. The CIO …

CISO
Why a push for encryption backdoors is a global security risk

Governments in the UK, US, and Europe are pressuring tech companies to weaken encryption in the name of security. The latest push from the UK government demanding Apple create …

identity fraud
Online crime-as-a-service skyrockets with 24,000 users selling attack tools

The growth of AI-based technology has introduced new challenges, making remote identity verification systems more vulnerable to attacks, according to iProov. Innovative and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools