Please turn on your JavaScript for this page to function normally.
critical infrastructure
New insights into the global industrial cybersecurity landscape

In this Help Net Security video, William Noto, VP and Industry Principal for Claroty, discusses their recent global survey of 1,100 IT and OT security professionals who work …

industrial equipment
A closer look at the manufacturing threat landscape

The manufacturing industry is embracing digital transformation to fuel efficiency and productivity. However, this evolution is accompanied by profound and growing …

networking
How executives adapt to rising cybersecurity concerns in mobile networks

In this Help Net Security video, Rowland Corr, VP & Head of Government Relations at Enea, discusses the implications of burner phones and the crisis of confidence in …

connected car
Supply chain emerges as major vector in escalating automotive cyberattacks

In this Help Net Security video, Jay Yaneza, Cybersecurity Architect at VicOne, discusses how, in the first half of the year, cyberattacks on the automotive sector caused …

Apiiro Wiz
Wiz and Apiiro partner to provide context-driven security from code to cloud

Apiiro, a leading application security posture management (ASPM) solution, today announced its partnership with Wiz, the leading cloud security company and Cloud Native …

encryption
Preserving privacy through advanced encryption techniques

At its core, encryption involves the use of algorithms, mathematical functions that manipulate data into a seemingly random and indecipherable form. This encoded information, …

predictions
Staying ahead in 2024 with top cybersecurity predictions

What will 2024 hold for the cybersecurity landscape? In this Help Net Security video, Steve Cobb, CISO at SecurityScorecard, offers his take on what professionals can expect …

LATMA
A closer look at LATMA, the open-source lateral movement detection tool

In this Help Net Security video, Gal Sadeh, Head of Data and Security Research at Silverfort, discusses LATMA, a free, open-source tool. It’s engineered with advanced …

quantum computing
Adapting cybersecurity for the quantum computing era

Researchers are exploring promising quantum computing applications across various domains, from cryptography and optimization problems to drug discovery and artificial …

AI
Using AI and automation to manage human cyber risk

Despite advanced security protocols, many cybersecurity incidents are still caused by employee actions. In this Help Net Security video, John Scott, Lead Cybersecurity …

zero trust
Why zero-trust segmentation is critical for cloud resilience

Nearly all organizations rely on the cloud to store sensitive data and run critical systems. But for many, cloud security hasn’t kept up. 93% agree that zero-trust …

elections GenAI
Exploring the impact of generative AI in the 2024 presidential election

2024 is a presidential election year in the US. 2016 and 2020 both saw impressive increases in attempts to influence voters through crafty propaganda and social media …

Don't miss

Cybersecurity news