Category: HelpnetSecurity

When AI agents interact, risk can emerge without warning
07
Jan
2026

When AI agents interact, risk can emerge without warning

System level risks can arise when AI agents interact over time, according to new research that examines how collective behavior…

What European security teams are struggling to operationalize
07
Jan
2026

What European security teams are struggling to operationalize

European security and compliance teams spend a lot of time talking about regulation. A new forecast report from Kiteworks suggests…

Gen AI data violations more than double
07
Jan
2026

Gen AI data violations more than double

Security teams track activity that moves well beyond traditional SaaS platforms, with employees interacting daily with generative AI tools, personal…

Product showcase: Blokada for Android gives users control over network traffic
06
Jan
2026

Product showcase: Blokada for Android gives users control over network traffic

Blokada is a network privacy and ad-blocking application available on Android, iOS, Windows, macOS, and Linux. It is designed to…

Turning plain language into firewall rules
06
Jan
2026

Turning plain language into firewall rules

Firewall rules often begin as a sentence in someone’s head. A team needs access to an application. A service needs…

The roles and challenges in moving to quantum-safe cryptography
06
Jan
2026

The roles and challenges in moving to quantum-safe cryptography

A new research project examines how organizations, regulators, and technical experts coordinate the transition to quantum safe cryptography. The study…

What security teams miss in email attacks
06
Jan
2026

What security teams miss in email attacks

Email remains the most common entry point for attackers. This article examines how phishing, impersonation, and account takeover continue to…

AI security risks are also cultural and developmental
05
Jan
2026

AI security risks are also cultural and developmental

Security teams spend much of their time tracking vulnerabilities, abuse patterns, and system failures. A new study argues that many…

Pharma's most underestimated cyber risk isn't a breach
05
Jan
2026

Pharma’s most underestimated cyber risk isn’t a breach

Chirag Shah, Global Information Security Officer & DPO at Model N examines how cyber risk in pharma and life sciences…

OpenAEV: Open-source adversarial exposure validation platform
05
Jan
2026

OpenAEV: Open-source adversarial exposure validation platform

OpenAEV is an open source platform designed to plan, run, and review cyber adversary simulation campaigns used by security teams….

From experiment to production, AI settles into embedded software development
02
Jan
2026

From experiment to production, AI settles into embedded software development

AI-generated code is already running inside devices that control power grids, medical equipment, vehicles, and industrial plants. AI moves from…

Hospitals are drowning in threats they can’t triage
02
Jan
2026

Hospitals are drowning in threats they can’t triage

Healthcare is facing a rise in cyber threats driven by vulnerable medical devices, growing data exposure, and AI adoption. This…