Skyhigh Security announced the launch of its risk-focused data visibility and compliance dashboard as part of Skyhigh DSPM’s Data Explorer. In April 2025, Data Security Posture Management (DSPM) was integrated into Skyhigh Security’s SSE framework to provide visibility into where…
Tag: Help Net Security
Protecto Vault adds API-first protection for safer AI agent workflows
Protecto launched Protecto Vault, a SaaS platform designed specifically for AI agent builders. Featuring a pay-as-you-go model, Vault removes the primary barrier to AI adoption: enterprise refusal to share sensitive data due to security, PII exposure, and HIPAA compliance risks.…
Apptega Policy Manager streamlines policy creation and compliance oversight
Apptega revealed its Policy Manager module, expanding the company’s platform to automate the creation, review, and oversight of custom business policies. With this enhancement, Apptega enables partners and in-house security and compliance teams to maintain auditable policies with minimal manual…
Henkel CISO on the messy truth of monitoring factories built across decades
In this Help Net Security interview, Stefan Braun, CISO at Henkel, discusses how smart manufacturing environments introduce new cybersecurity risks. He explains where single points of failure hide, how attackers exploit legacy systems, and why monitoring must adapt to mixed-generation…
The hidden dynamics shaping who produces influential cybersecurity research
Cybersecurity leaders spend much of their time watching how threats and tools change. A new study asks a different question, how has the research community itself changed over the past two decades. Researchers from the University of Southampton examined two…
LLMs are everywhere in your stack and every layer brings new risk
LLMs are moving deeper into enterprise products and workflows, and that shift is creating new pressure on security leaders. A new guide from DryRun Security outlines how these systems change long standing assumptions about data handling, application behavior, and internal…
UTMStack: Open-source unified threat management platform
UTMStack is an open-source unified threat management platform that brings SIEM and XDR features into one system. The project focuses on real time correlation of log data, threat intelligence, and malware activity patterns gathered from different sources. The goal is…
Building SOX compliance through smarter training and stronger password practices
A SOX audit can reveal uncomfortable truths about how a company handles access to financial systems. Even organizations that invest in strong infrastructure often discover that everyday password habits weaken the controls they thought were solid. CISOs know that passwords…
Holly Ventures launches $33 million fund focused on early-stage cyber innovation
Holly Ventures announced the launch of its $33 million debut fund, a solo-led cybersecurity vehicle built around a simple idea that for early-stage cyber start-ups, access and value matter more than capital. Founded by John Brennan, formerly a Senior Partner…
New Black Kite module offers product-level insight into software supply chain vulnerabilities
Black Kite released its new Product Analysis module, which allows security teams to evaluate the risks of third-party software products at a granular level. As the first TPRM platform to offer this capability, Black Kite provides a more detailed view…
Nudge Security expands platform with new AI governance capabilities
Nudge Security announced an expansion of its platform to address the need for organizations to mitigate AI data security risks while supporting workforce AI use. New capabilities include: AI conversation monitoring: Detect sensitive data shared via file uploads and conversations…
watchTowr Active Defense delivers automated protection from exposure to defense
watchTowr announced major capability enhancements, including the launch of Active Defense, a new capability that closes the gap between discovery and protection. Active Defense delivers automated, intelligence-driven protection the moment a validated exposure is identified, providing defenders with near-instant coverage…
New Black Kite module delivers product-level insight into software supply chain vulnerabilities
Black Kite released its new Product Analysis module, which allows security teams to evaluate the risks of third-party software products at a granular level. As the first TPRM platform to offer this capability, Black Kite provides a more detailed view…
AI-driven threats are heading straight for the factory floor
In this Help Net Security interview, Natalia Oropeza, Chief Cybersecurity Officer at Siemens, discusses how industrial organizations are adapting to a shift in cyber risk driven by AI. She notes that in-house capability, especially for OT response and recovery, is…
New image signature can survive cropping, stop deepfakes from hijacking trust
Deepfake images can distort public debate, fuel harassment, or shift a news cycle before anyone checks the source. A new study from researchers at the University of Pisa examines one specific part of this problem. They introduced a way to…
AI agents break rules in unexpected ways
AI agents are starting to take on tasks that used to be handled by people. These systems plan steps, call tools, and carry out actions without a person approving every move. This shift is raising questions for security leaders. A…
The simple shift that turns threat intel from noise into real insight
In this Help Net Security video, Alankrit Chona, CTO at Simbian, explains how security teams can put threat intelligence to work in a way that supports detection, response, and hunting. Chona walks through why many teams stumble. The problem is…
Cybersecurity jobs available right now: December 9, 2025
Associate Analyst, Cyber Threat Intelligence Sony | USA | Remote – View job details As an Associate Analyst, Cyber Threat Intelligence, you will collect and analyze open-source threat data to identify signs of cyber threats. You will prepare analysis reports,…
NinjaOne rolls out secure, compliant remote access for IT teams
NinjaOne announced NinjaOne Remote, a remote access solution natively integrated into the NinjaOne Platform. NinjaOne Remote was built from the ground up for businesses, not consumers, with security in mind, and gives IT teams and MSPs fast, reliable, and secure…
Download: Evaluating Password Monitoring Vendors
Organizations using Active Directory must update their password policies to block and detect compromised passwords. However, comparing vendors in this area can be challenging. By asking the right questions, you can identify the right partner and avoid introducing new technical,…