threat detection
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/21112520/identity-id-400x200.webp)
How CISOs enable ITDR approach through the principle of least privilege
Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/12155822/cloud-security-400x200.webp)
Signatures should become cloud security history
It’s becoming evident that the legacy practice of signature-based threat detection needs to be improved for cloud security challenges. In this Help Net Security video, …
![Snowflake](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31190256/snowflake-1500-400x200.webp)
YetiHunter: Open-source threat hunting tool for Snowflake environments
Cloud identity protection company Permiso has created YetiHunter, a threat detection and hunting tool companies can use to query their Snowflake environments for evidence of …
![Sanjay Macwan](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/21120823/sanjay_macwan-2-vonage-400x200.jpg)
Leveraging AI and automation for enhanced cloud communication security
In this Help Net Security interview, Sanjay Macwan, CIO and CISO at Vonage, addresses emerging threats to cloud communications and the role of AI and automation in …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/14123407/ai-robots-400x200.jpg)
The power of AI in cybersecurity
The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber threat …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17122607/iphone-eye-1400-400x200.jpg)
Kaspersky releases utility to detect iOS spyware infections
Kaspersky’s researchers have developed a lightweight method to detect indicators of infection from sophisticated iOS spyware such as NSO Group’s Pegasus, …
![mental health](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165903/mental_health-400x200.png)
Best practices to mitigate alert fatigue
In this Help Net Security video, Peter Manev, Chief Strategy Officer at Stamus Networks, discusses a pervasive problem plaguing security analysts called “alert fatigue,” – …
![government cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/09102406/government_cybersecurity-1400-400x200.jpg)
Government organizations’ readiness in the face of cyber threats
Cyber threats targeting government organizations have become increasingly sophisticated, posing significant risks to national security, public infrastructure, and sensitive …
![Windows injection](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/12115557/windows-syringe-400x200.jpg)
“Pool Party” process injection techniques evade EDRs
SafeBreach researchers have discovered eight new process injection techniques that can be used to covertly execute malicious code on Windows systems. Dubbed “Pool …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/09170820/ai-brain-400x200.jpg)
Hands-on threat simulations: Empower cybersecurity teams to confidently combat threats
Security processes are increasingly automated which has led some businesses to deprioritize developing their security teams’ defense skills. While antivirus and non-human …
![Microsoft Security Copilot](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/29150233/microsoft-security-copilot-1600-400x200.jpg)
Microsoft unveils AI-powered Security Copilot analysis tool
Microsoft has unveiled Security Copilot, an AI-powered analysis tool that aims to simplify, augment and accelerate security operations (SecOps) professionals’ work. …
![criminal hacking](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103100/criminal_hacking-400x200.jpg)
Attackers never let a critical vulnerability go to waste
GreyNoise Intelligence unveiled its research report that dives deep into the most significant threat detection events of the past 12 months. “When it comes to cybersecurity, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege