Category: HelpnetSecurity

Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs
09
Mar
2025

Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How QR code attacks work…

Cloud security gains overshadowed by soaring storage fees
07
Mar
2025

Cloud security gains overshadowed by soaring storage fees

Storage fees in general (e.g., API calls, operations, data access) comprise 49% of an average user’s service bill, compared to…

Can AI-powered gamified simulations help cybersecurity teams keep up?
07
Mar
2025

Can AI-powered gamified simulations help cybersecurity teams keep up?

Traditional training often lacks the hands-on experience cybersecurity teams need to counter advanced threats. AI-powered gamified simulations combine artificial intelligence…

New infosec products of the week: March 7, 2025
07
Mar
2025

New infosec products of the week: March 7, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Outpost24, Palo Alto Networks, Red…

Cybersecurity jobs available right now in the USA: March 6, 2025
06
Mar
2025

Cybersecurity jobs available right now in the USA: March 6, 2025

CISO Amplitude | USA | Hybrid – View job details As a CISO, you will develop, implement, and maintain a…

How to prevent data leakage in collaboration tools like Slack and Teams
06
Mar
2025

How to prevent data leakage in collaboration tools like Slack and Teams

In recent years, collaboration tools have become an absolute necessity for remote and hybrid work. This primarily increased during the…

The CISO's bookshelf: 10 must-reads for security leaders
06
Mar
2025

The CISO’s bookshelf: 10 must-reads for security leaders

Discover essential reads for CISOs in this curated list of books covering cybersecurity leadership, risk management, zero trust, board communication,…

89% of enterprise AI usage is invisible to the organization
06
Mar
2025

89% of enterprise AI usage is invisible to the organization

Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections…

Sonatype AI SCA delivers visibility and control over AI/ML usage
05
Mar
2025

Sonatype AI SCA delivers visibility and control over AI/ML usage

Sonatype announced end-to-end AI Software Composition Analysis (AI SCA) capabilities that enable enterprises to harness the full potential of AI….

Why multi-cloud security needs a fresh approach to stay resilient
05
Mar
2025

Why multi-cloud security needs a fresh approach to stay resilient

As enterprises expand their multi-cloud strategies to drive agility and scalability, CISOs must prioritize cyber resilience across diverse cloud platforms….

Fix Inventory: Open-source cloud asset inventory tool
05
Mar
2025

Fix Inventory: Open-source cloud asset inventory tool

Fix Inventory is an open-source tool for detecting compliance and security risks in cloud infrastructure accounts. It was built from…

eBook: What does it take to be a full-fledged virtual CISO?
04
Mar
2025

eBook: What does it take to be a full-fledged virtual CISO?

Virtual Chief Information Security Officer (vCISO) services are in high demand. Even though it is clear to all that this…