Category: HelpnetSecurity

CISOs are managing risk in survival mode
29
Dec
2025

CISOs are managing risk in survival mode

CISOs carry expanding responsibility as cybersecurity budgets rise, AI adoption spreads, and board expectations grow. Risk management now depends on…

Week in review: WatchGuard Firebox firewalls attacked, infosec enthusiasts targeted with fake PoCs
28
Dec
2025

Week in review: WatchGuard Firebox firewalls attacked, infosec enthusiasts targeted with fake PoCs

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Building cyber talent through competition,…

LLMs can assist with vulnerability scoring, but context still matters
26
Dec
2025

LLMs can assist with vulnerability scoring, but context still matters

Every new vulnerability disclosure adds another decision point for already stretched security teams. A recent study explores whether LLMs can…

From AI to cyber risk, why IT leaders are anxious heading into 2026
26
Dec
2025

From AI to cyber risk, why IT leaders are anxious heading into 2026

Cybersecurity threats are shaping IT planning for 2026, with AI maturity and regulation emerging as another major source of disruption,…

The next big IT security battle is all about privileged access
26
Dec
2025

The next big IT security battle is all about privileged access

Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in 2026 driven by new realities…

ServiceNow to acquire Armis for $7.75 billion
24
Dec
2025

ServiceNow to acquire Armis for $7.75 billion

ServiceNow entered into an agreement to acquire Armis for $7.75 billion in cash. The acquisition will expand ServiceNow’s security workflow…

Elementary OS 8.1 rolls out with a stronger focus on system security
24
Dec
2025

Elementary OS 8.1 rolls out with a stronger focus on system security

Elementary OS 8.1 is now available for download and shipping on select hardware from retailers such as Star Labs, Slimbook,…

Conjur: Open-source secrets management and application identity
24
Dec
2025

Conjur: Open-source secrets management and application identity

Conjur is an open-source secrets management project designed for environments built around containers, automation, and dynamic infrastructure. It focuses on…

24
Dec
2025

What if your face could say “don’t record me”? Researchers think it’s possible

Phones, smart glasses, and other camera-equipped devices capture scenes that include people who never agreed to be recorded. A newly…

Governance maturity defines enterprise AI confidence
24
Dec
2025

Governance maturity defines enterprise AI confidence

AI security has reached a point where enthusiasm alone no longer carries organizations forward. New Cloud Security Alliance research shows…

Counterfeit defenses built on paper have blind spots
24
Dec
2025

Counterfeit defenses built on paper have blind spots

Counterfeit protection often leans on the idea that physical materials have quirks no attacker can copy. A new study challenges…

What happens to enterprise data when GenAI shows up everywhere
24
Dec
2025

What happens to enterprise data when GenAI shows up everywhere

Generative AI is spreading across enterprise workflows, shaping how employees create, share, and move information between systems. Security teams are…