![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23151629/plan-governance-400x200.jpg)
CISOs must shift from tactical defense to strategic leadership
Cyber threats are advancing quickly in size and sophistication, largely because of the rapid evolution of technology, increasing sophistication of cyber attackers, and the …
![breach](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/07153034/breach-attack-1400-400x200.jpg)
Only 13% of organizations are cyber mature
A staggering 83% of organizations have suffered a material security breach recently, with over half occurring in the past year alone, underscoring the critical need for …
![quantum computing](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29114607/quantum_computing-1400-400x200.jpg)
Preparing for Q-Day as NIST nears approval of PQC standards
Q-Day—the day when a cryptographically relevant quantum computer can break most forms of modern encryption—is fast approaching, leaving the complex systems our societies rely …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15161411/botnet-400x200.webp)
1 out of 3 breaches go undetected
Organizations continue to struggle in detecting breaches as they become more targeted and sophisticated, with more than 1 out of 3 organizations citing their existing security …
![online fraud](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/25200942/online-fraud-400x200.jpg)
Modern fraud detection need not rely on PII
Trends in online fraud detection often act as the canary in the coal mine when it comes to understanding and combating the next generation of online scams, fraud and …
![Vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/17164813/vulnerability-1500-1-400x200.webp)
AI’s role in accelerating vulnerability management
With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In the field of vulnerability management …
![social engineering](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31195930/social-engineering_1500-400x200.webp)
90% of threats are social engineering
In this Help Net Security video, Jakub Kroustek, Malware Research Director at Gen, discusses the Avast Q1 2024 Threat Report. The report highlights significant trends and …
![NIST CSF 2.0](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27104454/nist-csf-2-compressed-400x200.webp)
The evolution of security metrics for NIST CSF 2.0
CISOs have long been spreadsheet aficionados, soaking up metrics and using them as KPIs for security progress. These metrics have traditionally measured specific systems or …
![leaders](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/29083640/leaders1-400x200.jpg)
The critical role of IT staffing in strengthening cybersecurity
Many organizations lack adequate IT staffing to combat cyber threats. A comprehensive approach to cybersecurity requires more than technical solutions. It involves the right …
![Chris Peake](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/06120733/chris_peake-2-smartsheet-1-400x200.webp)
Tailoring responsible AI: Defining ethical guidelines for industry-specific use
In this Help Net Security interview, Chris Peake, CISO & SVP at Smartsheet, explains how responsible AI should be defined by each organization to guide their AI …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203448/data_analytics2-400x200.jpg)
The strategic advantages of targeted threat intelligence
In this Help Net Security video, Gabi Reish, Chief Business Development and Product Officer at Cybersixgill, discusses the role of threat intelligence in every …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25121808/ransomware-computer-2-1500-400x200.webp)
Global attacker median dwell time continues to fall
While the use of zero-day exploits is on the rise, Mandiant’s M-Trends 2024 report reveals a significant improvement in global cybersecurity posture: the global median …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege