Product showcase: UserLock IAM for Active Directory

UserLock brings modern identity and access management (IAM) to Active Directory, adding granular multi-factor authentication (MFA), contextual access controls, single sign-on (SSO) and real-time session management. It helps AD-first teams secure logons… Continue reading Product showcase: UserLock IAM for Active Directory

What zero trust looks like when you build it step by step

In this Help Net Security video, Jonathan Edwards, Managing Director at KeyData Cyber, walks us through what practical zero trust adoption looks like in stages. He explains why he dislikes the term itself, then shifts to steps teams can follow without … Continue reading What zero trust looks like when you build it step by step

Week in review: Fake “Windows Update” fuels malware, Salesforce details Gainsight breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Quantum encryption is pushing satellite hardware to its limits In this Help Net Security interview, Colonel Ludovic Monnerat, Commander Space Command, Swi… Continue reading Week in review: Fake “Windows Update” fuels malware, Salesforce details Gainsight breach

Black Friday 2025 for InfoSec: How to spot real value and avoid the noise

Your inbox is probably drowning in Black Friday emails right now. Another “limited time offer” that’ll reappear next month, countdown timer creating artificial urgency. You’re right to be skeptical — most of it is noise. But bur… Continue reading Black Friday 2025 for InfoSec: How to spot real value and avoid the noise

How board members think about cyber risk and what CISOs should tell them

In this Help Net Security video, Jonathan Trull, EVP & CISO at Qualys, discusses which cybersecurity metrics matter most to a board of directors. Drawing on more than two decades in the field, he explains how boards think about their duty to overs… Continue reading How board members think about cyber risk and what CISOs should tell them

The breaches everyone gets hit by (and how to stop them)

Headlines scream about zero-days and nation-state attacks, but the reality is far less glamorous. Ross Haleliuk, from Venture in Security talks about the concept of humans being wired to overweight rare, dramatic events and underweight the everyday ris… Continue reading The breaches everyone gets hit by (and how to stop them)

Black Friday 2025 cybersecurity deals to explore

Black Friday 2025 is shaping up to be a good moment for anyone thinking about tightening their cybersecurity. A few solid deals are popping up that make it easier to improve protection for systems and data without stretching your budget. If you have be… Continue reading Black Friday 2025 cybersecurity deals to explore

Week in review: Stealth-patched FortiWeb vulnerability under active exploitation, Logitech data breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The tech that turns supply chains from brittle to unbreakable In this Help Net Security interview, Sev Kelian, CISO and VP of Security at Tecsys, discusse… Continue reading Week in review: Stealth-patched FortiWeb vulnerability under active exploitation, Logitech data breach

How one quick AI check can leak your company’s secrets

In this Help Net Security video, Dinesh Nagarajan, Global Partner, Cyber Security Services at IBM Consulting, walks through a situation in which an employee shared production source code with a public AI tool. The tool learned from the code, including … Continue reading How one quick AI check can leak your company’s secrets

Exam prep hacked: Study tips and tricks that really work

Ready to get certified but not sure where to start? Get insider tips and tricks on what to do from day one to test day. Join ISC2-certified instructors and an audience of your peers for this live interactive webinar. Find out what to do in the months, … Continue reading Exam prep hacked: Study tips and tricks that really work