Category: HelpnetSecurity

Businesses turn to private AI for enhanced security and data management
30
Sep
2024

Businesses turn to private AI for enhanced security and data management

In this Help Net Security interview, Joe Baguley, CTO EMEA at Broadcom, shares insights on private AI and its significance…

The most common authentication method is also the least secure
30
Sep
2024

The most common authentication method is also the least secure

Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico. The…

Week in review: Windows Server 2025 gets hotpatching option, PoC for SolarWinds WHD flaw released
29
Sep
2024

Week in review: Windows Server 2025 gets hotpatching option, PoC for SolarWinds WHD flaw released

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Windows Server 2025 gets hotpatching…

Tosint: Open-source Telegram OSINT tool
27
Sep
2024

Tosint: Open-source Telegram OSINT tool

Tosint is an open-source Telegram OSINT tool that extracts useful information from Telegram bots and channels. It’s suited for security…

3 tips for securing IoT devices in a connected world
27
Sep
2024

3 tips for securing IoT devices in a connected world

IoT devices have become integral to how many organizations operate. From Smart TVs in conference rooms to connected sensors and…

Developing an effective cyberwarfare response plan
27
Sep
2024

Developing an effective cyberwarfare response plan

In this Help Net Security interview, Nadir Izrael, CTO at Armis, discusses how AI has transformed cyberwarfare by amplifying attacks’…

New infosec products of the week: September 27, 2024
27
Sep
2024

New infosec products of the week: September 27, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Absolute, ArmorCode, Bitdefender, Guardsquare, Malwarebytes,…

How to lock and hide iPhone apps in iOS 18
27
Sep
2024

How to lock and hide iPhone apps in iOS 18

iOS 18 allows you to lock and hide apps to protect the information within them by requiring Face ID, Touch…

The number of Android memory safety vulnerabilities has tumbled, and here's why
26
Sep
2024

The number of Android memory safety vulnerabilities has tumbled, and here’s why

Google’s decision to write new code into Android’s codebase in Rust, a memory-safe programming language, has resulted in a significant…

New MIT protocol protects sensitive data during cloud-based computation
26
Sep
2024

New MIT protocol protects sensitive data during cloud-based computation

Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often…

AI use: 3 essential questions every CISO must ask
26
Sep
2024

AI use: 3 essential questions every CISO must ask

In July, Wall Street experienced its worst day since 2022, with the tech-focused Nasdaq falling by 3.6%. The downturn was…

Compliance management strategies for protecting data in complex regulatory environments
26
Sep
2024

Compliance management strategies for protecting data in complex regulatory environments

In this Help Net Security interview, Andrius Buinovskis, Head of Product at NordLayer, discusses how organizations can assess their compliance…