How to build an effective cybersecurity simulation

Most people groan at the prospect of security training. It’s typically delivered through dull online videos or uninspiring exercises that fail to capture real-world urgency. To make a real difference in cyber crisis readiness, personnel need the opport… Continue reading How to build an effective cybersecurity simulation

Generative AI Is reshaping financial fraud. Can security keep up?

In this Help Net Security interview, Yinglian Xie, CEO at DataVisor, explains how evolving fraud tactics require adaptive, AI-driven prevention strategies. With fraudsters using generative AI to launch sophisticated attacks, financial institutions must… Continue reading Generative AI Is reshaping financial fraud. Can security keep up?

Two things you need in place to successfully adopt AI

Organizations should not shy away from taking advantage of AI tools, but they need to find the right balance between maximizing efficiency and mitigating organizational risk. They need to put in place: 1. A seamless AI security policy AI may have previ… Continue reading Two things you need in place to successfully adopt AI

Android financial threats: What businesses need to know to protect themselves and their customers

The rise of mobile banking has changed how businesses and customers interact. It brought about increased convenience and efficiency, but has also opened new doors for cybercriminals, particularly on the Android platform, which dominates the global smar… Continue reading Android financial threats: What businesses need to know to protect themselves and their customers

A closer look at The Ultimate Cybersecurity Careers Guide

In this Help Net Security interview, Kim Crawley, cybersecurity expert and Professor at the Open Institute of Technology, discusses her latest book, The Ultimate Cybersecurity Careers Guide. She shares insights on how aspiring professionals can break i… Continue reading A closer look at The Ultimate Cybersecurity Careers Guide

The hidden costs of security tool bloat and how to fix it

In this Help Net Security interview, Shane Buckley, President and CEO at Gigamon, discusses why combating tool bloat is a top priority for CISOs as they face tighter budgets and expanding security stacks. Buckley shares insights on how deep observabili… Continue reading The hidden costs of security tool bloat and how to fix it

Cyber insurance isn’t always what it seems

Many companies think cyber insurance will protect them from financial losses after an attack. But many policies have gaps. Some claims get denied. Others cover less than expected. CISOs must understand the risks before an attack happens. Misconceptions… Continue reading Cyber insurance isn’t always what it seems

A CISO’s guide to securing AI models

In AI applications, machine learning (ML) models are the core decision-making engines that drive predictions, recommendations, and autonomous actions. Unlike traditional IT applications, which rely on predefined rules and static algorithms, ML models a… Continue reading A CISO’s guide to securing AI models

Spring clean your security data: The case for cybersecurity data hygiene

Spring cleaning isn’t just for your closets; security teams should take the same approach to their security operations data, where years of unchecked log growth have created a bloated, inefficient and costly mess. The modern Security Operations Center … Continue reading Spring clean your security data: The case for cybersecurity data hygiene

How AI agents could undermine computing infrastructure security

In this Help Net Security video, Ev Kontsevoy, CEO at Teleport, explores the risks AI agents pose to computing infrastructure, particularly when exposed to social engineering attacks. Unlike traditional software, AI agents aren’t fully deterministic, m… Continue reading How AI agents could undermine computing infrastructure security