Building a cybersecurity strategy that survives disruption

Cybersecurity isn’t what it used to be. Attackers are moving quicker, disruptions happen all the time, and many security plans built for more predictable times just can’t keep up. With everything from ransomware to geopolitical threats to cloud slip-up… Continue reading Building a cybersecurity strategy that survives disruption

Balancing data protection and clinical usability in healthcare

In this Help Net Security interview, Aaron Weismann, CISO at Main Line Health, discusses the growing ransomware threat in healthcare and why the sector remains a prime target. He explains the difficulties of protecting patient information, securing leg… Continue reading Balancing data protection and clinical usability in healthcare

BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework

BlueToolkit is an open-source tool that helps find security flaws in Bluetooth Classic devices. It runs known and custom exploits to test if a device is vulnerable. Right now, it includes 43 different exploits. Some are public, and others were made spe… Continue reading BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework

Why global tensions are a cybersecurity problem for every business

With global tensions climbing, cyber attacks linked to nation-states and their allies are becoming more common, sophisticated, and destructive. For organizations, cybersecurity can’t be treated as separate from world events anymore, they’re closely con… Continue reading Why global tensions are a cybersecurity problem for every business

Generative AI Is reshaping financial fraud. Can security keep up?

In this Help Net Security interview, Yinglian Xie, CEO at DataVisor, explains how evolving fraud tactics require adaptive, AI-driven prevention strategies. With fraudsters using generative AI to launch sophisticated attacks, financial institutions must… Continue reading Generative AI Is reshaping financial fraud. Can security keep up?

A closer look at The Ultimate Cybersecurity Careers Guide

In this Help Net Security interview, Kim Crawley, cybersecurity expert and Professor at the Open Institute of Technology, discusses her latest book, The Ultimate Cybersecurity Careers Guide. She shares insights on how aspiring professionals can break i… Continue reading A closer look at The Ultimate Cybersecurity Careers Guide

The hidden costs of security tool bloat and how to fix it

In this Help Net Security interview, Shane Buckley, President and CEO at Gigamon, discusses why combating tool bloat is a top priority for CISOs as they face tighter budgets and expanding security stacks. Buckley shares insights on how deep observabili… Continue reading The hidden costs of security tool bloat and how to fix it

Cyber insurance isn’t always what it seems

Many companies think cyber insurance will protect them from financial losses after an attack. But many policies have gaps. Some claims get denied. Others cover less than expected. CISOs must understand the risks before an attack happens. Misconceptions… Continue reading Cyber insurance isn’t always what it seems