Category: Help Net Security

Gurucul’s AI-IRM accelerates insider risk detection

Gurucul released its AI Insider Risk Management (AI-IRM) product, which extends autonomous triage, bias-free risk scoring, context-rich investigation, and human-AI collaboration to automate response workflows directly within insider risk operations. Organizations face a rise in insider threats, from employees, contractors…

Catchpoint improves monitoring posture with AI capabilities

Catchpoint released two AI-powered capabilities designed to simplify digital resilience for critical applications: Catchpoint Root Cause Analysis (RCA) and Catchpoint Advisor, which improve monitoring posture and bring immediate insights into IT incidents, ending the guesswork. With IT teams facing challenges…

Absolute Security Rehydrate restores compromised endpoints

Absolute Security released Rehydrate, empowering enterprises to recover from IT or cyber incidents remotely and at scale to minimize operational downtime. Enterprises with business operations that have been stopped by Windows PCs made inoperable by cyberattacks, ransomware strikes, and IT…

Ping Identity debuts AI framework to keep humans in control

Ping Identity announced a new AI framework designed to close the trust gap created by the rise of AI agents, along with AI-powered assistants that boost administrator productivity. This framework makes verifiable trust a foundation of every digital interaction, helping…

AI made crypto scams far more dangerous

The first half of 2025 saw one of the worst waves of crypto hacks to date, with more than $3.01 billion stolen. AI was a big part of it, making scams easier to run and letting even low-skill criminals get…

GreyNoise unveils MCP Server to power AI-driven SOC workflows

GreyNoise Intelligence introduced the GreyNoise Model Context Protocol (MCP) Server to enable MCP-compatible LLMs and agents to query GreyNoise APIs directly, providing real-time, actionable threat intelligence for AI agents. “AI Agents represent a major shift in cybersecurity, moving beyond simple…

Shadow AI is breaking corporate security from within

Cybersecurity leaders know the attack surface has been growing for years, but the latest State of Information Security Report 2025 from IO shows how fast new risks are converging. Drawing on responses from more than 3,000 security professionals in the…

Nagomi Control reveals where organizations are most exposed

Nagomi Security announced the next step in its platform evolution with Nagomi Control, a new release that enhances Continuous Threat Exposure Management (CTEM) by enabling security teams to shift from identifying exposures to fixing them. While CTEM has long provided…

BeyondTrust introduces identity security controls for AI

BeyondTrust released new AI security controls in Identity Security Insights. These capabilities provide visibility into AI agents, secure orchestration of their actions, and an on-board intelligence layer to help teams make faster, smarter security decisions. “The rise of AI agents…

How a fake ICS network can reveal real cyberattacks

Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet built to closely mimic a real industrial environment. Why traditional honeypots fall short Honeypots are systems designed to attract attackers…

Creating a compliance strategy that works across borders

In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving worldwide. He talks about how organizations can stay compliant with international rules while keeping their systems practical and user-friendly. Goldberg…