Why workforce identity is still a vulnerability, and what to do about it

Most organizations believe they have workforce identity under control. New hires are verified. Accounts are provisioned. Multi-factor authentication is enforced. Audits are passed. Then a breach happens, often through an account that was “properly secu… Continue reading Why workforce identity is still a vulnerability, and what to do about it

Secure by Design: Building security in at the beginning

Secure by Design is not a single tool, product, or one‑time activity. It is a holistic approach that requires security to be deliberately embedded from the very beginning, at the point where systems, software, and services are conceived and designed. R… Continue reading Secure by Design: Building security in at the beginning

Keepnet launches AI incident response agents that redefine post-delivery email threat containment

Keepnet, the AI-powered Extended Human Risk Management (xHRM) platform, today announced the launch of its AI-Driven Email Incident Response Agents — autonomous AI agents that analyze, decide, act, and continuously learn to contain employee-reported ema… Continue reading Keepnet launches AI incident response agents that redefine post-delivery email threat containment

When cyber threats start thinking for themselves

In this Help Net Security video, Jason Rivera, Field CISO & Head of Solution Engineering at SimSpace, discusses how autonomous AI agents are changing cyber threats. Drawing on experience in the US Army, NSA, Deloitte, and CrowdStrike, he describes… Continue reading When cyber threats start thinking for themselves

Week in review: Self-spreading npm malware hits developers, Cisco SD-WAN 0-day exploited since 2023

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Identity verification systems are struggling with synthetic fraud Fake and expired IDs keep showing up in routine customer transactions, from alcohol purc… Continue reading Week in review: Self-spreading npm malware hits developers, Cisco SD-WAN 0-day exploited since 2023

Binding Operational Directive 26-02 sets deadlines for edge device replacement

In this Help Net Security video, Jen Sovada, General Manager, Public Sector at Claroty, explains CISA’s Binding Operational Directive 26-02 and what it means for federal agencies. The directive requires agencies to inventory, report, decommission, and … Continue reading Binding Operational Directive 26-02 sets deadlines for edge device replacement

Week in review: Firmware-level Android backdoor found on tablets, Dell zero-day exploited since 2024

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Security at AI speed: The new CISO reality The CISO role has changed significantly over the past decade, but according to John White, EMEA Field CISO, Tor… Continue reading Week in review: Firmware-level Android backdoor found on tablets, Dell zero-day exploited since 2024

Applying green energy tax policies to improve cybersecurity

For years, governments have focused only on the stick of compliance when they could leverage the carrot of tax incentives. Theoretically, compliance fines and penalties should act as a deterrent that improves accountability and reduces data breaches. H… Continue reading Applying green energy tax policies to improve cybersecurity

The era of the Digital Parasite: Why stealth has replaced ransomware

For years, ransomware encryption functioned as the industry’s alarm bell. When systems locked up, defenders knew an attack had occurred. Not anymore. New empirical data show that attackers are actively dismantling that signal. According to Picus Securi… Continue reading The era of the Digital Parasite: Why stealth has replaced ransomware

Cybersecurity in cross-border logistics operations

In this Help Net Security video, Dieter Van Putte, CTO at Landmark Global, discusses how cybersecurity has become a core part of global supply chain operations. He explains that logistics is now also about data moving between carriers, customs authorit… Continue reading Cybersecurity in cross-border logistics operations