Please turn on your JavaScript for this page to function normally.
energy
Third-party breaches shake the foundations of the energy sector

90% of the world’s largest energy companies experienced a third-party breach in the past 12 months, according to SecurityScorecard. Powering the global economy and everyday …

AI
Security leaders on high alert as GenAI poses privacy and security risks

Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data …

lock
1 in 5 executives question their own data protection programs

In this Help Net Security video, Tanneasha Gordon, Deloitte Risk & Financial Advisory’s data & privacy leader, discusses how many executives realize that trust is …

path
Transforming cybersecurity from reactive to proactive with attack path analysis

An attack path is important to prioritize potential risks in cloud environments. The attack path offers the ability to look at cloud environments from the attacker’s …

network
Enhancing mainframe security with proven best practices

Mainframe systems have served as the bedrock of enterprise networks for years, standing unmatched in terms of reliability, scalability, and data protection. However, security …

data analytics
Infostealers and the high value of stolen data

The risk of personal and professional data being stolen by nefarious actors looms larger than ever, according to Trend Micro. Understanding the risks associated with data …

cloud
The perils of over-reliance on single cloud providers

The risk associated with dependence on a particular cloud provider for multiple business capabilities is in the top five emerging risks for organizations for the second …

Guy Guzner
AI threat landscape: Model theft and inference attacks emerge as top concerns

Generative AI has emerged as a powerful tool, heralded for its potential but also scrutinized for its implications. Enterprises will invest nearly $16 billion worldwide on …

Brent Deterding
The real impact of the cybersecurity poverty line on small organizations

The financial constraints many smaller organizations face often cast shadows on their ability to fortify defenses. In this Help Net Security interview, Brent Deterding, CISO …

insider threat
Despite rising insider risk costs, budgets are being wasted in the wrong places

The cost of an insider risk is the highest it’s ever been, as organizations spend more time than ever trying to contain insider incidents, according to DTEX Systems. The …

privacy
The gap in users’ identity security knowledge gives cybercriminals an opening

With exponential growth in the number of human and machine actors on the network and more sophisticated technology in more places, identity in this new era is rapidly becoming …

ChatGPT
6 ChatGPT risks for legal and compliance leaders

Legal and compliance leaders should address their organization’s exposure to six specific ChatGPT risks, and what guardrails to establish to ensure responsible enterprise use …

Don't miss

Cybersecurity news