Please turn on your JavaScript for this page to function normally.
James A. Winnefeld Jr.
The evolution of deception tactics from traditional to cyber warfare

Admiral James A. Winnefeld, USN (Ret.), is the former vice chairman of the Joint Chiefs of Staff and is an advisor to Acalvio Technologies. In this Help Net Security …

executives
CISOs and board members are finding a common language

86% of CISOs believe generative AI will alleviate skills gaps and talent shortages on the security team, filling labor-intensive and time-consuming security functions and …

mental health
Factors leading to organizations losing control over IT and security environments

Companies are challenged with the growing need to connect everything in their business while maintaining control over their security, productivity, and competitive growth, …

computer
Balancing cybersecurity with convenience and progress

Changing approaches to cybersecurity have led to slow but steady progress in defense and protection. Still, competing interests create a growing challenge for cybersecurity …

numbers
New quantum random number generator could revolutionize encryption

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption developed at …

Kevin Paige
How CISOs break down complex security challenges

The role of the CISO has evolved into a critical position that encompasses many responsibilities aimed at safeguarding digital assets, preserving data integrity, and …

Xavier Bellekens
Deception technology and breach anticipation strategies

Cybersecurity is undergoing a paradigm shift. Previously, defenses were built on the assumption of keeping adversaries out; now, strategies are formed with the idea that they …

cloud
IaaS networking services revenue to hit $19.4 billion in 2023

The importance of networking to and within cloud environments has grown significantly for enterprise customers as more and more applications, workloads, and data are moved to …

artificial intelligence
Companies are rushing into generative AI without a cohesive, secure strategy

Despite mass adoption of generative AI, most companies don’t have a coordinated strategy for deploying it or know how to assess its security—exposing them to risks and …

healthcare
Why data travel is healthcare’s next big cybersecurity challenge

Do you know where your patients’ data lives once it’s in the cloud? Unfortunately, for many healthcare organizations, the answer is no – or, at least, it’s not a definitive …

Arthur Hu
Using AI/ML to optimize your tech stack and enhance business efficiency

In this Help Net Security interview, Arthur Hu, SVP, Global CIO and Services & Solutions Group CTO at Lenovo, discusses how AI/ML is optimizing tech stacks, the hurdles …

network
Broadband consumers demand security and sustainability

Consumer expectations will reshape the needs and economics of the internet, according to Cisco. People in EMEA are rethinking what they rely on the internet for, balancing …

Don't miss

Cybersecurity news