Please turn on your JavaScript for this page to function normally.
What security leaders should watch for when companies buy or sell a business

In this Help Net Security video, Lane Sullivan, SVP, CISO and Strategy Officer at Concentric AI, explains what security leaders should think about during mergers, …

user
Data brokers are exposing medical professionals, and turning their personal lives into open files

Large amounts of personal information about medical professionals are available on people search sites. A new analysis by Incogni’s researchers shows how much data about …

Sonia Kumar
Smart grids are trying to modernize and attackers are treating it like an invitation

In this Help Net Security interview, Sonia Kumar, Senior Director Cyber Security at Analog Devices, discusses how securing decentralized smart grids demands a shift in …

internet
A day in the life of the internet tells a bigger story

On any given day, the internet carries countless signals that hint at how networks behave behind the scenes. Researchers from RIPE NCC and several universities found a way to …

quantum computing
The quantum clock is ticking and businesses are still stuck in prep mode

Quantum computing is still years away from breaking current encryption, but many security teams are already worried about what happens when that moment arrives. A new report …

door
Global law enforcement actions put pressure on cybercrime networks

In 2025, law enforcement agencies disrupted the infrastructure and operations of established cybercriminal groups. These groups shift across borders, and the agencies pursuing …

botnet
CISOs are questioning what a crisis framework should look like

CISOs increasingly assume the next breach is coming. What concerns them most is whether their teams will understand the incident quickly enough to limit the fallout. A recent …

world
Threat intelligence programs are broken, here is how to fix them

Security teams often gather large amounts of threat data but still struggle to improve detection or response. Analysts work through long lists of alerts, leaders get unclear …

Dennis Pickett
Creative cybersecurity strategies for resource-constrained institutions

In this Help Net Security interview, Dennis Pickett, CISO at RTI International, talks about how research institutions can approach cybersecurity with limited resources and …

AI
Attackers keep finding new ways to fool AI

AI development keeps accelerating while the safeguards around it move on uneven ground, according to The International AI Safety Report. Security leaders are being asked to …

authentication
The collapse of trust at the identity layer

Identity verification has become the latest front in the fight against industrialized fraud, according to a new report from Regula. The shift is visible across sectors that …

Michael Yaroshefsky
Treating MCP like an API creates security blind spots

In this Help Net Security interview, Michael Yaroshefsky, CEO at MCP Manager, discusses how Model Context Protocol’s (MCP) trust model creates security gaps that many …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools