AI can help you optimize your supply chain
There are three key questions concerning artificial intelligence (AI) in the supply chain: Where are we today and what are some of the tailwinds driving the implementation of …
                                Security stack consolidation helps CISOs lower cybersecurity spending
In this Help Net Security video, Alfredo Hickman, Head of Information Security at Obsidian Security, discusses the importance of security stack consolidation for organizations …
                                Cybersecurity pros opine on the future of security
Trellix released global research revealing the cost of siloed security, weak spots in protection, and lack of confidence amongst security operations teams. This Help Net …
                                Educational institutions must reverse their backward approach to cyber defense
As schools have become more digital, they’ve taken a somewhat backward approach to cybersecurity, historically moving slowly, and have weak cybersecurity controls and …
                                The dangers of orphaned data and what companies can do about it
Orphaned data is data that still sits on an organization’s network but was created and owned by a now deactivated employee. In this Help Net Security video, Carl …
                                Fear of cybercriminals drives cybersecurity improvements
Fortifying cybersecurity defenses remains a work in progress for many organizations, who acknowledge their shortcomings but have yet to commit the necessary resources to the …
                                Cost-effective steps healthcare CISOs can take to mitigate damaging attacks
Cybersecurity measures are increasingly failing to close gaps, and the healthcare industry, in particular, has become a high-dollar target due to limited budgets and quick …
                                New RSA Conference CEO talks about delivering value
Kylie Wright-Ford was recently named CEO of RSA Conference LLC. She joins RSAC with an extensive track record of building communities for business professionals, having served …
                                Why paying the ransom is a mistake
New research from Databarracks reveals 44% of organizations that suffered a ransomware attack, paid the ransom. 34% recovered from backups, while 22% used ransomware …
                                How to improve employees’ cybersecurity behavior
We already have cybersecurity behaviors we learned from elsewhere, especially those who have grown up with technology. Initially, cybersecurity starts from home and school, …
                                Constellation: Open-source, runtime-encrypted Kubernetes
Confidential Computing is a hardware-based technology that shields computer workloads from their environments and keeps data encrypted during processing. In this Help Net …
                                How government organizations can stay steps ahead of attackers
Attacks against governments are nothing new. They have been an interesting target since they have existed, for the mere reason that not everyone agrees on how things are run. …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down