Category: HelpnetSecurity

The CISO's bookshelf: 10 must-reads for security leaders
06
Mar
2025

The CISO’s bookshelf: 10 must-reads for security leaders

Discover essential reads for CISOs in this curated list of books covering cybersecurity leadership, risk management, zero trust, board communication,…

89% of enterprise AI usage is invisible to the organization
06
Mar
2025

89% of enterprise AI usage is invisible to the organization

Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections…

Sonatype AI SCA delivers visibility and control over AI/ML usage
05
Mar
2025

Sonatype AI SCA delivers visibility and control over AI/ML usage

Sonatype announced end-to-end AI Software Composition Analysis (AI SCA) capabilities that enable enterprises to harness the full potential of AI….

Why multi-cloud security needs a fresh approach to stay resilient
05
Mar
2025

Why multi-cloud security needs a fresh approach to stay resilient

As enterprises expand their multi-cloud strategies to drive agility and scalability, CISOs must prioritize cyber resilience across diverse cloud platforms….

Fix Inventory: Open-source cloud asset inventory tool
05
Mar
2025

Fix Inventory: Open-source cloud asset inventory tool

Fix Inventory is an open-source tool for detecting compliance and security risks in cloud infrastructure accounts. It was built from…

eBook: What does it take to be a full-fledged virtual CISO?
04
Mar
2025

eBook: What does it take to be a full-fledged virtual CISO?

Virtual Chief Information Security Officer (vCISO) services are in high demand. Even though it is clear to all that this…

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
04
Mar
2025

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation

In this Help Net Security interview, Matthew Darlage, CISO at Citizens, discusses key strategies for strengthening cyber resilience in banks….

CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
04
Mar
2025

CISO vs. CIO: Where security and IT leadership clash (and how to fix it)

The dynamic between CISOs and CIOs has always been complex. While both roles are essential to an organization’s success, their…

Cybersecurity jobs available right now: March 4, 2025
04
Mar
2025

Cybersecurity jobs available right now: March 4, 2025

Application Security Engineer Via | Israel | Hybrid – View job details As a Application Security Engineer, you will perform…

Online crime-as-a-service skyrockets with 24,000 users selling attack tools
03
Mar
2025

Online crime-as-a-service skyrockets with 24,000 users selling attack tools

The growth of AI-based technology has introduced new challenges, making remote identity verification systems more vulnerable to attacks, according to…

How QR code attacks work and how to protect yourself
03
Mar
2025

How QR code attacks work and how to protect yourself

QR codes have become an integral part of our everyday life due to their simplicity. While they’ve been around for…

Commix: Open-source OS command injection exploitation tool
03
Mar
2025

Commix: Open-source OS command injection exploitation tool

Commix is an open-source penetration testing tool designed to automate the detection and exploitation of command injection vulnerabilities, streamlining security…