Why vulnerability reports stall inside shared hosting companies

Security teams keep sending vulnerability notifications, and the same pattern keeps repeating. Many alerts land, few lead to fixes. A new qualitative study digs into what happens after those reports arrive and explains why remediation so often stops sh… Continue reading Why vulnerability reports stall inside shared hosting companies

The messy data trails of telehealth are becoming a security nightmare

In this Help Net Security interview, Scott Bachand, CIO/CISO at Ro, discusses how telehealth reshapes the flow of patient data and what that means for security. He explains why organizations must strengthen data classification and visibility as systems… Continue reading The messy data trails of telehealth are becoming a security nightmare

How researchers are teaching AI agents to ask for permission the right way

People are starting to hand more decisions to AI agents, from booking trips to sorting digital files. The idea sounds simple. Tell the agent what you want, then let it work through the steps. The hard part is what the agent does with personal data alon… Continue reading How researchers are teaching AI agents to ask for permission the right way

Creative cybersecurity strategies for resource-constrained institutions

In this Help Net Security interview, Dennis Pickett, CISO at RTI International, talks about how research institutions can approach cybersecurity with limited resources and still build resilience. He discusses the tension between open research and the n… Continue reading Creative cybersecurity strategies for resource-constrained institutions

Treating MCP like an API creates security blind spots

In this Help Net Security interview, Michael Yaroshefsky, CEO at MCP Manager, discusses how Model Context Protocol’s (MCP) trust model creates security gaps that many teams overlook and why MCP must not be treated like a standard API. He explains… Continue reading Treating MCP like an API creates security blind spots

Heineken CISO champions a new risk mindset to unlock innovation

In this Help Net Security interview, Marina Marceta, CISO at Heineken, discusses what it takes for CISOs to be seen as business-aligned leaders rather than technical overseers. She shares how connecting security to business impact can shift perceptions… Continue reading Heineken CISO champions a new risk mindset to unlock innovation

How an AI meltdown could reset enterprise expectations

In this Help Net Security interview, Graham McMillan, CTO at Redgate Software, discusses AI, security, and the future of enterprise oversight. He explains why past incidents haven’t pushed the industry to mature. McMillan also outlines the structural s… Continue reading How an AI meltdown could reset enterprise expectations

Quantum encryption is pushing satellite hardware to its limits

In this Help Net Security interview, Colonel Ludovic Monnerat, Commander Space Command, Swiss Armed Forces, discusses how securing space assets is advancing in response to emerging quantum threats. He explains why satellite systems must move beyond tra… Continue reading Quantum encryption is pushing satellite hardware to its limits

What security pros should know about insurance coverage for AI chatbot wiretapping claims

AI-powered chatbots raise profound concerns under federal and state wiretapping and eavesdropping statutes that is being tested by recent litigation, creating greater exposure to the companies and developers that use this technology. Security professio… Continue reading What security pros should know about insurance coverage for AI chatbot wiretapping claims

The tech that turns supply chains from brittle to unbreakable

In this Help Net Security interview, Sev Kelian, CISO and VP of Security at Tecsys, discusses how organizations can strengthen supply chain resilience through a more unified and forward-looking strategy. Kelian also shares how new technologies and a bl… Continue reading The tech that turns supply chains from brittle to unbreakable