![audio deepfakes](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/03114652/audio_deepfakes-400x200.png)
Audio deepfakes: What they are, and the risks they present
Audio deepfakes are becoming a big problem. Recent cybercriminal campaigns use voice cloning technology to replicate the speech tone and patterns of celebrities such as Elon …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29120634/cloud_security-1400-400x200.jpg)
Exposing the top cloud security threats
Many companies consider AI-powered threats to be the top cloud security threat to their business. Concerningly, less than half are confident in their ability to tackle those …
![cybersecurity books](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09195636/cybersecurity_books_2024-1400-400x200.jpg)
Expand your library with these cybersecurity books
In this Help Net Security video round-up, authors discuss their cybersecurity books and provide an inside look at each title. Complete videos George Finney, CSO at Southern …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20080340/strategy-400x200.jpg)
The next wave of mobile threats
According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security …
![breach](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/07153034/breach-attack-1400-400x200.jpg)
Stopping security breaches by managing AppSec posture
Many security vulnerabilities result from human error, and the majority of these are reflected in the application layer. These errors may occur at any stage in the software …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/12153721/genai-1500-400x200.webp)
AI risks under the auditor’s lens more than ever
According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology’s …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26142115/compliance-400x200.jpg)
Defining a holistic GRC strategy
End-user spending on security and risk management will total $215 billion in 2024, according to Gartner. In this Help Net Security video, Nicholas Kathmann, CISO at LogicGate, …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25130053/email-2-1500-400x200.webp)
How malicious email campaigns continue to slip through the cracks
In this Help Net Security video, Josh Bartolomie, VP of Global Threat Services at Cofense, discusses how email will remain a target as long as it remains the predominant form …
![cyber attacks](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/03113713/cyber_attacks-1500-400x200.webp)
Threat actors are raising the bar for cyber attacks
From sophisticated nation-state-sponsored intrusions to opportunistic malware campaigns, cyber attacks manifest in various forms, targeting vulnerabilities in networks, …
![access](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29223248/access-400x200.webp)
How manual access reviews might be weakening your defenses
As businesses evolve, they often experience changes in roles, partnerships, and staff turnover. This dynamic can result in improper access to data and resources. Such …
![world map](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29222743/world-map-1500-400x200.webp)
Strengthening defenses against nation-state and for-profit cyber attacks
There is an urgent need to secure tactical, operational, and strategic critical assets from the edge to the core. In this Help Net Security video, Geoffrey Mattson, CEO of …
![human risk](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29221250/human-risk-400x200.webp)
Human risk is the top cyber threat for IT teams
After another year rife with cybercrime, IT and cyber leaders are confronted with a new reality. AI and deepfakes can trick even the most well-trained employee, and executing …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege