8 US telcos compromised, FBI advises Americans to use encrypted communications

FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors that have – and will – burrow into the networks and… Continue reading 8 US telcos compromised, FBI advises Americans to use encrypted communications

Best practices for staying cyber secure during the holidays

In this Help Net Security video, Sean Tufts, managing partner for critical infrastructure and operational technology at Optiv, discusses best practices for keeping businesses secure amidst a barrage of threats during the holiday season. Pause large cha… Continue reading Best practices for staying cyber secure during the holidays

Practical strategies to build an inclusive culture in cybersecurity

In this Help Net Security interview, Alona Geckler, Chief of Staff, SVP of Business Operations at Acronis, shares her insights on the diversity environment in the cybersecurity and IT industries. She discusses the progress made over the past two decade… Continue reading Practical strategies to build an inclusive culture in cybersecurity

Overcoming legal and organizational challenges in ethical hacking

In this Help Net Security interview, Balázs Pózner, CEO at Hackrate, discusses the essential technical skills for ethical hackers and how they vary across different security domains. He explains how AI and machine learning enhance ethical hacking by st… Continue reading Overcoming legal and organizational challenges in ethical hacking

Active network of North Korean IT front companies exposed

An analysis of the websites belonging to companies that served as a front for getting North Korean IT workers remote jobs with businesses worldwide has revealed an active network of such companies originating in China. Unearthing North Korean IT front … Continue reading Active network of North Korean IT front companies exposed

Five backup lessons learned from the UnitedHealth ransomware attack

The ransomware attack on UnitedHealth earlier this year is quickly becoming the healthcare industry’s version of Colonial Pipeline, prompting congressional testimony, lawmaker scrutiny and potential legislation.  Over the past few months, there have be… Continue reading Five backup lessons learned from the UnitedHealth ransomware attack

CISOs in 2025: Balancing security, compliance, and accountability

In this Help Net Security interview, Daniel Schwalbe, CISO at DomainTools, discusses the intensifying regulatory demands that have reshaped CISO accountability and daily decision-making. He outlines the skill sets future CISOs need, their key prioritie… Continue reading CISOs in 2025: Balancing security, compliance, and accountability

Tips for a successful cybersecurity job interview

Whether you’re looking to enhance your existing cybersecurity skills or just beginning your journey in the field, cybersecurity offers a wide range of career opportunities. If you’re considering a career shift, exploring new job opportunities, or aimin… Continue reading Tips for a successful cybersecurity job interview

Strategies for CISOs navigating hybrid and multi-cloud security

In this Help Net Security interview, Alex Freedland, CEO at Mirantis, discusses the cloud security challenges that CISOs need to tackle as multi-cloud and hybrid environments become the norm. He points out the expanded attack surfaces, the importance o… Continue reading Strategies for CISOs navigating hybrid and multi-cloud security

AWS security essentials for managing compliance, data protection, and threat detection

AWS offers a comprehensive suite of security tools to help organizations manage compliance, protect sensitive data, and detect threats within their environments. From AWS Security Hub and Amazon GuardDuty to Amazon Macie and AWS Config, each tool is vi… Continue reading AWS security essentials for managing compliance, data protection, and threat detection