Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
supply chain
Third-party partners or ticking time bombs?

In this Help Net Security video, Ngaire Elizabeth Guzzetti, Technical Director Supply Chain at CyXcel, discusses why a third of U.S. organizations don’t trust …

AI code
AI can write your code, but nearly half of it may be insecure

While GenAI excels at producing functional code, it introduces security vulnerabilities in 45 percent of cases, according to Veracode’s 2025 GenAI Code Security Report, which …

cyber risks
Why 90% of cyber leaders are feeling the heat

90% of cyber leaders find managing cyber risks harder today than five years ago, mainly due to the explosion of AI and expanding attack surfaces, according to BitSight. These …

Aayush Choudhury
Security tooling pitfalls for small teams: Cost, complexity, and low ROI

In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large enterprises don’t work well for leaner, …

CISO
What’s keeping risk leaders up at night? AI, tariffs, and cost cuts

Enterprise risk leaders are most concerned about rising tariffs and trade tensions heading into the second half of 2025, according to a new report from Gartner. The firm’s …

supply chain
Your supply chain security strategy might be missing the biggest risk

Third-party involvement in data breaches has doubled this year from 15 percent to nearly 30 percent. In response, many organizations have sharpened their focus on third-party …

online fraud
The fraud trends shaping 2025: Pressure builds on online retailers

Fraud is growing faster than revenue in eCommerce. That’s one of the first things PwC and Forter point out in their new report, and it’s a wake-up call for online retailers. …

cyber risks
What the law says about your next data breach

In this Help Net Security video, Chad Humphries, Solution Consultant, Networks & Cyber Security at Rockwell Automation, explores how cyber risk quantification is becoming …

Cindy Segond von Banchet CC
What a mature OT security program looks like in practice

In this Help Net Security interview, Cindy Segond von Banchet CC, Cybersecurity Lead at Yokogawa Europe, shares her insights on what defines a sustainable OT security program. …

insider threat
Most cybersecurity risk comes from just 10% of employees

A new report from Living Security and the Cyentia Institute sheds light on the real human element behind cybersecurity threats, and it’s not what most organizations expect. …

Bitdefender
Bitdefender PHASR: Proactive hardening demo overview

Discover how Bitdefender PHASR enables organizations to identify and remediate security misconfigurations before attackers can exploit them. This demo walks through PHASR’s …

connected
Exposed and unaware? Smart buildings need smarter risk controls

75% of organizations have building management systems (BMS) affected by known exploited vulnerabilities (KEVs), according to Claroty.

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools