Category: HelpnetSecurity

How to manage your cyber risk in a modern attack surface
04
Jun
2025

How to manage your cyber risk in a modern attack surface

According to research, 62% of organizations said their attack surface grew over the past year. It’s no coincidence that 76%…

Rethinking governance in a decentralized identity world
04
Jun
2025

Rethinking governance in a decentralized identity world

Decentralized identity (DID) is gaining traction, and for CISOs, it’s becoming a part of long-term planning around data protection, privacy,…

Agentic AI and the risks of unpredictable autonomy
04
Jun
2025

Agentic AI and the risks of unpredictable autonomy

In this Help Net Security interview, Thomas Squeo, CTO for the Americas at Thoughtworks, discusses why traditional security architectures often…

CISOs need better tools to turn risk into action
04
Jun
2025

CISOs need better tools to turn risk into action

Many organizations are overwhelmed by the complexity of their IT systems, making it difficult to manage cybersecurity risks, according to…

AttackIQ Ready3 identifies which vulnerabilities are truly exposed
03
Jun
2025

AttackIQ Ready3 identifies which vulnerabilities are truly exposed

AttackIQ releaseed AttackIQ Ready3. With expanded discovery capabilities, Ready3 maps both internal and external attack surfaces. By correlating asset discovery…

Akamai launches DNS Posture Management for real-time monitoring and guided remediation
03
Jun
2025

Akamai launches DNS Posture Management for real-time monitoring and guided remediation

Akamai Technologies has introduced Akamai DNS Posture Management, a solution that offers unified, multicloud visibility over all DNS assets. The…

Photos: Infosecurity Europe 2025 - Help Net Security
03
Jun
2025

Photos: Infosecurity Europe 2025 – Help Net Security

Infosecurity Europe 2025 is a cybersecurity event taking place from June 3 to 5 in London. Help Net Security is…

Scammers are impersonating Interactive Brokers: Here's what you need to know
03
Jun
2025

Scammers are impersonating Interactive Brokers: Here’s what you need to know

Interactive Brokers is warning customers to be on high alert due to a wave of scams involving fraudsters posing as…

Vet: Open-source software supply chain security tool
03
Jun
2025

Vet: Open-source software supply chain security tool

Vet is an open source tool designed to help developers and security engineers spot risks in their software supply chains….

How global collaboration is hitting cybercriminals where it hurts
03
Jun
2025

How global collaboration is hitting cybercriminals where it hurts

In this Help Net Security interview, William Lyne, Deputy Director of UK’s National Crime Agency, discusses the cybercrime ecosystem and…

Cybersecurity jobs available right now: June 3, 2025
03
Jun
2025

Cybersecurity jobs available right now: June 3, 2025

CISO Halan Microfinance Bank | Pakistan | On-site – View job details As a CISO, you will develop and implement…

Development vs. security: The friction threatening your code
03
Jun
2025

Development vs. security: The friction threatening your code

Developers are driven to deliver new features quickly, while security teams prioritize risk mitigation, which often puts the two at…