Features
![Pete Hoff](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/04131356/pete_hoff-2-wursta-400x200.jpg)
How should SMBs navigate the phishing minefield?
In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on how to minimize the threat phishing presents to …
![Adrien Petit](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/29110531/adrien_petit-2-uncovery-400x200.jpg)
The blueprint for a highly effective EASM solution
In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management …
![LibreOffice](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/22210016/libreoffice1-400x200.jpg)
LibreOffice: Stability, security, and continued development
LibreOffice, the most widely used open-source office productivity suite, has plenty to recommend it: it’s feature-rich, user-friendly, well-documented, reliable, has an …
![Slava Bronfman](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/28110348/slava_bronfman-2-cybellum-400x200.jpg)
Shifting left and right, innovating product security
In this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, …
![Thorsten Hau](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/29110536/thorsten_hau-2-fidentity-400x200.jpg)
The misconceptions preventing wider adoption of digital signatures
In this Help Net Security interview, Thorsten Hau, CEO at fidentity, discusses the legal validity of qualified digital signatures, demonstrating their equivalence to …
![Kevin Valk](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/29110533/kevin_valk-2-codean-400x200.jpg)
What does optimal software security analysis look like?
In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools for software security. He explains how these …
![Patrice Auffret](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/23112810/patrice_auffret-2-onyphe-400x200.jpg)
What makes a good ASM solution stand out
In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that …
![Florian Forster](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131036/florian_forster-2-zitadel-400x200.jpg)
Adapting authentication to a cloud-centric landscape
In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote …
![Jonathan Segev](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131051/jonathan_segev-2-ieee-400x200.jpg)
IEEE 802.11az provides security enhancements, solves longstanding problems
In this Help Net Security interview, Jonathan Segev, IEEE 802.11 Task Group (TG) Chair of next-generation positioning (TGaz) at IEEE, discusses IEEE 802.11az. The new standard …
![Gerwin van der Lugt](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/17102549/gerwin_van_der_lugt-2-oddity_ai-400x200.jpg)
AI and the evolution of surveillance systems
In this Help Net Security interview, Gerwin van der Lugt, CTO at Oddity, discusses the future of surveillance and AI’s influence. He also delves into how organizations …
![Roland Atoui](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131101/roland_atoui-2-red_alert_labs-400x200.jpg)
Anticipating the next wave of IoT cybersecurity challenges
In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected …
![Kennedy Torkura](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131056/kennedy_torkura-2-mitigant-400x200.jpg)
Maintaining consistent security in diverse cloud infrastructures
As cloud infrastructures become increasingly API-driven and dynamically spread across expansive attack surfaces, achieving clarity proves difficult. Compounding this challenge …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege