The hidden cost of putting off security decisions

In this Help Net Security video, Hanah Darley, Chief AI Officer, Geordie AI, talks about how putting off security risk decisions creates long-term costs that often stay hidden. Drawing on her work with CISOs and security leaders, she shows how delayed … Continue reading The hidden cost of putting off security decisions

Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk

Researchers at Tenable have disclosed two vulnerabilities, collectively referred to as “LookOut,” affecting Google Looker. Because the business intelligence platform is deployed by more than 60,000 organizations in 195 countries, the flaws could give a… Continue reading Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk

How Secure by Design helps developers build secure software

Security isn’t just a feature, it’s a foundation. As cyber threats grow more sophisticated and regulations tighten, developers are being asked to do more than just write clean code. They’re being asked to build software that’s secure by design througho… Continue reading How Secure by Design helps developers build secure software

Why incident response breaks down when it matters most

In this Help Net Security video, Jon David, Managing Director, NR Labs, discusses why incident response often breaks down during a breach. Drawing on years of experience watching real attackers operate across many industries, he walks through what tend… Continue reading Why incident response breaks down when it matters most

Why boards must prioritize non-human identity governance

Boards of Directors (BoDs) do three things exceptionally well when cyber is framed correctly. They set risk appetite, they allocate capital, and they demand evidence that the business can withstand disruption without losing momentum. Why cyber keeps be… Continue reading Why boards must prioritize non-human identity governance

Open-source AI pentesting tools are getting uncomfortably good

AI has come a long way in the pentesting world. We are now seeing open-source tools that can genuinely mimic how a human tester works, not just fire off scans. I dug into three of them, BugTrace-AI, Shannon, and CAI, the Cybersecurity AI framework, and… Continue reading Open-source AI pentesting tools are getting uncomfortably good

What boards need to hear about cyber risk, and what they don’t

In this Help Net Security video, Rishi Kaushal, CIO at Entrust, explains how security leaders should talk to the board about cyber risk. He focuses on what matters to board members and what does not. He links cryptography, certificates, and authenticat… Continue reading What boards need to hear about cyber risk, and what they don’t

Week in review: Microsoft fixes exploited Office zero-day, Fortinet patches FortiCloud SSO flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: When open science meets real-world cybersecurity In this Help Net Security interview, Matthew Kwiatkowski, CISO at Fermilab, America’s particle physics an… Continue reading Week in review: Microsoft fixes exploited Office zero-day, Fortinet patches FortiCloud SSO flaw

A practical take on cyber resilience for CISOs

In this Help Net Security video, Shebani Baweja, CISO for Consumer, Private, Wealth & Business Banking at Standard Chartered, explains how security leaders should think about cyber resilience. She outlines why preparation for extreme events matter… Continue reading A practical take on cyber resilience for CISOs