![executive](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171247/executive-400x200.jpg)
The CISO’s approach to AI: Balancing transformation with trust
As organizations increasingly adopt third-party AI tools to streamline operations and gain a competitive edge, they also invite a host of new risks. Many companies are …
![microsoft cybersecurity dilemma](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07153226/microsoft_cybersecurity_dilemma-400x200.webp)
Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella
Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with …
![cyberwar](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28085530/cyberwar-2-400x200.jpg)
Urgently needed: AI governance in cyber warfare
Artificial intelligence is quickly becoming central to societal growth. AI has great power to improve daily life, from education to healthcare, from sustainability to defense. …
![Varonis for Microsoft 365 Copilot](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/07135928/varonis-copilot-365-400x200.webp)
Maximizing productivity with Copilot for Microsoft 365: A security perspective
In this Help Net Security video, Brian Vecci, Field CTO at Varonis, talks about maximizing the potential of Microsoft Copilot for 365. He highlights its productivity benefits …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16113036/strategy-1400-3-400x200.jpg)
AI’s rapid growth puts pressure on CISOs to adapt to new security risks
The increased use of AI further complicates CISO role as industries begin to realize the full potential of GenAI and its impact on cybersecurity, according to Trellix. …
![human risk](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29221250/human-risk-400x200.webp)
Why SMBs are facing significant security, business risks
In this Help Net Security video, Alex Cox, Director of Threat Intelligence at LastPass, discusses how human factors are getting in the way while SMB leaders report investing …
![Pukar Hamal](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/02130722/pukar_hamal-2-securitypal-400x200.webp)
Strategies for preventing AI misuse in cybersecurity
As organizations increasingly adopt AI, they face unique challenges in updating AI models to keep pace with evolving threats while ensuring seamless integration into existing …
![supply chain](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25122426/supply_chain-2-1500-400x200.webp)
Securing your organization’s supply chain: Reducing the risks of third parties
When Stephen Hawking said that “we are all now connected by the internet, like neurons in a giant brain”, very few people understood the gravity of his statement. But ten …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27124629/ai-eye-1400-400x200.webp)
What AI can tell organizations about their M&A risk
Following the past few years of economic turbulence, merger and acquisition (M&A) activity is on the rise in 2024, with several acquisition deals being announced in the …
![Caleb Sima](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/04125142/caleb_sima-2-cloud_security_alliance-400x200.webp)
AI set to enhance cybersecurity roles, not replace them
In this Help Net Security interview, Caleb Sima, Chair of CSA AI Security Alliance, discusses how AI empowers security pros, emphasizing its role in enhancing skills and …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/12153721/genai-1500-400x200.webp)
AI risks under the auditor’s lens more than ever
According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology’s …
![cyber resilience](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20125121/cyber_resilience-400x200.jpg)
How exposure management elevates cyber resilience
Attackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to implement asset …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege