Please turn on your JavaScript for this page to function normally.
Pritesh Parekh
CISOs must speak business to earn executive trust

In this Help Net Security interview, Pritesh Parekh, VP, CISO at PagerDuty talks about how CISOs can change perceptions of their role, build influence across the organization, …

Artificial intelligence
AI vs AI: How cybersecurity pros can use criminals’ tools against them

For a while now, AI has played a part in cybersecurity. Now, agentic AI is taking center stage. Based on pre-programmed plans and objectives, agentic AI can make choices which …

CISO
Breaking down silos in cybersecurity

All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices, culture and …

Resilient Cybersecurity
Review: Resilient Cybersecurity

Resilient Cybersecurity touches on nearly every major function of enterprise cybersecurity, from threat detection and identity management to vendor risk and regulatory …

critical infrastructure
UNIDIR Intrusion Path: New framework to analyze ICT environment activities

Malicious activity in the ICT environment is growing. However, a non-technical audience often struggle to understand these threats, either because technical explanations are …

cybersecurity jobs
Cybersecurity jobs available right now: May 13, 2025

AVP, Vulnerability Management Engineer LPL Financial | USA | Hybrid – View job details As an AVP, Vulnerability Management Engineer, you will configure integrations …

FBI
Law enforcement takes down proxy botnets used by criminals

US and Dutch law enforcement, with the help of Lumen Technologies researchers, have disrupted 5socks and Anyproxy, two proxy-for-rent services that were used by criminals for …

backdoor
Compromised SAP NetWeaver instances are ushering in opportunistic threat actors

A second wave of attacks against the hundreds of SAP NetWeaver platforms compromised via CVE-2025-31324 is underway. “[The] attacks [are] staged by follow-on, …

Bluetooth
Bluetooth 6.1 released, enhances privacy and power efficiency

The Bluetooth Special Interest Group has released Bluetooth 6.1, and one of the most important new features is an update to how devices manage privacy and power. The update, …

Peter Garraghan
Why security teams cannot rely solely on AI guardrails

In this Help Net Security interview, Dr. Peter Garraghan, CEO of Mindgard, discusses their research around vulnerabilities in the guardrails used to protect large AI models. …

presentation skills
How to give better cybersecurity presentations (without sounding like a robot)

Most people think great presenters are born with natural talent. Luka Krejci, a presentation expert, disagrees. “They are called presentation skills. Skills, not …

Spire
SPIRE: Toolchain of APIs for establishing trust between software systems

SPIRE is a graduated project of the Cloud Native Computing Foundation (CNCF). It’s a production-ready implementation of the SPIFFE APIs that handles node and workload …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools