Tag: EN

10 Best Kubernetes Container Scanners In 2025

Kubernetes container scanners are essential tools for ensuring the security of containerized applications and Kubernetes clusters. These scanners analyze vulnerabilities, misconfigurations, and compliance issues within container images, Kubernetes manifests, and runtime environments. Popular tools like Kube Bench focus on compliance…

CISOs battle security platform fatigue

It starts with good intentions. A tool to stop phishing. Another to monitor endpoints. One more for cloud workloads. Soon, a well-meaning CISO finds themselves managing dozens of products across teams, each with its own dashboard, alerts, and licensing headaches.…

The 23andMe Collapse, Signal Gate Fallout

In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on…

The shift to identity-first security and why it matters

In this Help Net Security interview, Arun Shrestha, CEO at BeyondID, discusses how AI is transforming secure access management for both attackers and defenders. He discusses the shift toward identity-first security, and the role of contextual and continuous authentication in…

NICE Workforce Framework 2.0.0 Released: Everything New and Improved

The National Initiative for Cybersecurity Education (NICE) Workforce Framework for Cybersecurity has undergone a significant update, with the release of its version 2.0.0 introducing numerous enhancements aimed at standardizing how cybersecurity work and competencies are understood and managed. This major…

10 Best XDR (Extended Detection & Response) Solutions 2025

As cyber threats grow increasingly sophisticated, traditional security tools often fall short in providing comprehensive protection. Extended Detection and Response (XDR) has emerged as a next-generation cybersecurity solution designed to unify and enhance threat detection, investigation, and response across an…

Achieving Independent Control Over NHIs

Is Independent Control over Non-Human Identities Possible? The challenge of managing Non-Human Identities (NHIs) effectively is significantly increasing. With the rapid expansion of cloud technologies and the multiplying scale of machine identities, organizations are left grappling with the implications of…

NHI Solutions That Fit Your Budget

Why Non-Human Identities (NHIs) and Secrets Management Matter? Have you ever considered how seemingly non-interactive entities can pose a significant threat to your business’ security? NHIs and secrets management are two terms that are gaining critical importance in safeguarding the…

Ensuring Your NHIs Remain Free From Threats

How Can You Secure Your Organization’s NHIs? You may be pondering about the best practices for protecting your company’s Non-Human Identities (NHIs) and their secrets. To ensure your NHIs are free from threats, it’s essential to understand what NHIs are,…

The rise of compromised LLM attacks

In this Help Net Security video, Sohrob Kazerounian, Distinguished AI Researcher at Vectra AI, discusses how the ongoing rapid adoption of LLM-based applications has already introduced new cybersecurity risks. These vulnerabilities will not be in the LLM itself, but rather…

Oracle privately notifies Cloud data breach to customers

Oracle confirms a cloud data breach, quietly informing customers while downplaying the impact of the security breach. Oracle confirms a data breach and started informing customers while downplaying the impact of the incident. A threat actor using the moniker ‘rose87168’…