Review: Adversarial AI Attacks, Mitigations, and Defense Strategies

Adversarial AI Attacks, Mitigations, and Defense Strategies shows how AI systems can be attacked and how defenders can prepare. It’s essentially a walkthrough of offensive and defensive approaches to AI security. About the author John Sotiropoulo… Continue reading Review: Adversarial AI Attacks, Mitigations, and Defense Strategies

Using lightweight LLMs to cut incident response times and reduce hallucinations

Researchers from the University of Melbourne and Imperial College London have developed a method for using LLMs to improve incident response planning with a focus on reducing the risk of hallucinations. Their approach uses a smaller, fine-tuned LLM com… Continue reading Using lightweight LLMs to cut incident response times and reduce hallucinations

Fractional vs. full-time CISO: Finding the right fit for your company

In this Help Net Security interview, Nikoloz Kokhreidze, Fractional CISO at Mandos, discusses why many early- and growth-stage B2B companies hire full-time CISOs before it’s needed. He breaks down common founder misconceptions, explains the right appro… Continue reading Fractional vs. full-time CISO: Finding the right fit for your company

LudusHound: Open-source tool brings BloodHound data to life

LudusHound is an open-source tool that takes BloodHound data and uses it to set up a working Ludus Range for safe testing. It creates a copy of an Active Directory environment using previously gathered BloodHound data. Red teams can use this lab to map… Continue reading LudusHound: Open-source tool brings BloodHound data to life

The AI security crisis no one is preparing for

In this Help Net Security interview, Jacob Ideskog, CTO of Curity, discusses the risks AI agents pose to organizations. As these agents become embedded in enterprise systems, the potential for misuse, data leakage, and unauthorized access grows. Idesko… Continue reading The AI security crisis no one is preparing for

What happens when penetration testing goes virtual and gets an AI coach

Cybersecurity training often struggles to match the complexity of threats. A new approach combining digital twins and LLMs aims to close that gap. Researchers from the University of Bari Aldo Moro propose using Cyber Digital Twins (CDTs) and generative… Continue reading What happens when penetration testing goes virtual and gets an AI coach

How security teams are putting AI to work right now

AI is moving from proof-of-concept into everyday security operations. In many SOCs, it is now used to cut down alert noise, guide analysts during investigations, and speed up incident response. What was once seen as experimental technology is starting … Continue reading How security teams are putting AI to work right now

Review: Data Engineering for Cybersecurity

Data Engineering for Cybersecurity sets out to bridge a gap many security teams encounter: knowing what to do with the flood of logs, events, and telemetry they collect. About the author James Bonifield has a decade of experience analyzing malicious ac… Continue reading Review: Data Engineering for Cybersecurity

Weak alerting and slipping prevention raise risk levels for CISOs

Prevention effectiveness is falling, detection gaps remain wide, and attackers are exploiting weaknesses in data protection and credentials. Data theft prevention has dropped to 3 percent, password cracking success rates have nearly doubled, and new th… Continue reading Weak alerting and slipping prevention raise risk levels for CISOs

How military leadership prepares veterans for cybersecurity success

In this Help Net Security interview, Warren O’Driscoll, Head of Security Practice at NTT DATA UK and Ireland, discusses how military leadership training equips veterans with the mindset, resilience, and strategic thinking needed to excel in cyber… Continue reading How military leadership prepares veterans for cybersecurity success