In this Help Net Security interview, Jess Vachon, CISO at PRA Group, discusses the company’s multi-layered defense against fraud and its commitment to protecting customer trust. Vachon explains how... Read more »
In this Help Net Security video, Jacob Martens, Field CISO at Upwind Security, explores one of cybersecurity’s most enduring challenges: the human factor behind breaches. Despite advances in technology,... Read more »
Most countries are still making national cyber policy decisions without reliable numbers. Regulations often focus on incident reporting after damage is done, but they fail to give governments a... Read more »
Varonis Systems announced the availability of Varonis Interceptor, a new approach to email security that uses multi-layered AI to detect and block social engineering attacks, even when they originate... Read more »
Palo Alto Networks researchers have discovered and analyzed “IUAM ClickFix Generator”, a phishing kit that allows less skilled attackers to infect unsuspecting users with malware by using the increasingly... Read more »
North Korean hackers have stolen more than $2 billion in cryptocurrency in 2025, according to blockchain analytics firm Elliptic, and the year isn’t over yet. Though this year’s record... Read more »
Netskope has enhanced its Universal Zero Trust Network Access (UZTNA) solution. Comprised of Netskope One Private Access and Netskope Device Intelligence, Netskope’s UZTNA solution extends beyond the core use... Read more »
CyberArk announced new discovery and context capabilities across its Machine Identity Security portfolio. The enhancements enable security teams to find, understand and secure machine identities, spanning certificates, keys, secrets, workloads... Read more »
Radiflow has launched the new Radiflow360, a unified, AI-enhanced OT cybersecurity platform that delivers visibility, risk management and streamlined incident response for mid-sized industrial enterprises. Radiflow360 now enables mid-sized... Read more »
If you think managing cloud security is complex, try doing it across hundreds of satellites orbiting the planet. Each one is a moving endpoint that must stay secure while... Read more »