Help Net Security
@helpnetsecurity
Followers
60K
Following
14
Media
34K
Statuses
68K
Independent cybersecurity news since 1998. Discover what matters in the world of information security today.
Global
Joined April 2008
Week in review: 40 open-source tools securing the stack, invisible IT to be the next workplace priority - https://t.co/tYwdqfTeIj - #WeekInReview #Cybersecurity #CybersecurityNews
0
0
0
What 35 years of privacy law say about the state of data protection - https://t.co/exoKz0Vohi - @DakotaState @DSU_BCCCS #CyberSecurity #DataPrivacy #InfoSec #GDPR #CISO
0
2
3
President Trump says it perfectly. A patchwork of 50 different state systems creates a maze of conflicting regulations, resulting in chaos. Follow me to join the conversation on leading the AI revolution.
115
195
1K
LLM privacy policies keep getting longer, denser, and nearly impossible to decode - https://t.co/Y2QmreLKYt - @TaliaGillis @chun_yang_chen @TU_Muenchen @Columbia @nyuniversity - #Privacy #PrivacyPolicies #DataProtection #AI #LLMs #CyberSecurity #CyberSecurityNews #SecurityNews
0
1
1
Ransomware keeps widening its reach - https://t.co/B6xNIzVivF - @cybcubecom #CyberSecurity #Ransomware #InfoSec #CISO #CyberThreats
0
0
1
Uneven regulatory demands expose gaps in mobile security - https://t.co/QxU4UlJ0kY - @GSMA #MobileSecurity #Compliance #Regulation #Telecommunications #Cybersecurity #CybersecurityNews
0
0
1
I love this crossbody bag. It is large enough and small enough at the same time. It holds my full size wallet and sunglasses along with anything else that I might need. It isn’t bulky or heavy. It also fits in the Siena Rivera Tote.
3
0
22
New infosec products of the week: December 12, 2025 - https://t.co/vNbQOvtyLY - @apptega @BackslashSec @bigidsecure @BlackKiteTech @Bugcrowd @ninjaone @nudge_security @vezainc #InfosecProducts #Cybersecurity #CybersecurityNews
0
0
1
LLM vulnerability patching skills remain limited - https://t.co/t407xMBSL5 - #VulnerabilityManagement #LLM #AI #SoftwareEngineering #CyberSecurity #CyberSecurityNews #SecurityNews
helpnetsecurity.com
Automated vulnerability patching is gaining importance as LLMs handle certain flaws well but fall short on varied types and altered versions.
0
0
1
Password habits are changing, and the data shows how far we’ve come - https://t.co/SupYXkdvH1 - @flaresystems #passwords #authentication #CyberSecurity #CyberSecurityNews #video
helpnetsecurity.com
Password security trends data shows how habits, policies, and new tools helped strengthen passwords over decades while weak choices linger.
0
0
2
Product showcase: Tuta - secure, encrypted, private email - https://t.co/IticONf4D6 - #Privacy #CyberSecurity #EncryptedEmail #DataProtection
helpnetsecurity.com
Tuta Mail is a fully encrypted email service that keeps your messages private, with no ads, no tracking and secure apps across platforms.
0
0
1
Teamwork is failing in slow motion and security feels it - https://t.co/WCYa5XEbH3 - @forrester #ArtificialIntelligence #Collaboration #Cybersecurity #CybersecurityNews
helpnetsecurity.com
Teamwork is breaking down in new ways as AI spreads, creating security gaps that leaders must address to protect workflows and data.
0
0
2
Henkel CISO on the messy truth of monitoring factories built across decades - https://t.co/CGL5ui71Mk - @Henkel #CISO #Cloud #Firmware #IoT #SaaS #ManufactoringSector #Cybersecurity #CybersecurityNews
helpnetsecurity.com
Smart manufacturing struggles with fragile architectures, legacy devices, and uneven monitoring that create cybersecurity weaknesses.
0
0
2
The hidden dynamics shaping who produces influential cybersecurity research - https://t.co/D0T8qePIMQ - @unisouthampton #CyberSecurity #InfoSec #Research #CISO #SecurityScience
helpnetsecurity.com
Cybersecurity research trends show shifts in team structures, gender balance, and collaboration networks, offering insight into the field.
0
0
0
UTMStack: Open-source unified threat management platform - https://t.co/eJloD86vTE - @StackUtm @GitHub #GitHub #CyberSecurity #XDR #UTM #OpenSource #software
helpnetsecurity.com
UTMStack is an open-source unified threat management platform that brings SIEM and XDR features into one system.
0
0
1
LLMs are everywhere in your stack and every layer brings new risk - https://t.co/ut9TzVHx8u - @owasp @dryrunsec #AI #Cybersecurity #LLMSecurity #AppSec #CISO
helpnetsecurity.com
LLMs are moving deeper into enterprise products and workflows, and that shift is creating new pressure on security leaders. A new guide from DryRun
0
1
0
Building SOX compliance through smarter training and stronger password practices - https://t.co/6ap7isExQ9 - @passwork_pro #SOX #CISO #Compliance #PasswordManagement #Cybersecurity #CybersecurityNews
helpnetsecurity.com
SOX compliance improves when password practices are consistent, traceable, and centralized, helping CISOs reduce risk and audit findings.
0
0
1
Holly Ventures launches $33 million fund focused on early-stage cyber innovation - https://t.co/KCgeLIZWWY - #HollyVentures #Funding #Startup #Innovation #Cybersecurity #CybersecurityNews
0
0
1
Download: Evaluating Password Monitoring Vendors - https://t.co/D7d66X8Qko - @EnzoicSecurity #Passwords #ActiveDirectory #Guide #Cybersecurity #CybersecurityNews
0
0
1
AI-driven threats are heading straight for the factory floor - https://t.co/EMuosMXGDC - @Siemens @NataliaOropezaG #CriticalInfrastructure #ArtificialIntelligence #CISO #Compliance #ThreatModeling #Strategy #cybersecurity #CybersecurityNews
helpnetsecurity.com
Industrial companies are seeing a cyber shift, and building in-house incident response is becoming the capability they need most.
0
0
0
AI agents break rules in unexpected ways - https://t.co/fBemuANA5Y - @Intuit #AI #CyberSecurity #AIAgents #InfoSec #CISO
helpnetsecurity.com
AI agent testing shows how tool using models can break rules under pressure, revealing risks leaders must understand before deploying agents.
1
0
1
New image signature can survive cropping, stop deepfakes from hijacking trust - https://t.co/1VXVK0fbrd - @Unipisa - #Deepfakes #ImageAuthentication #CyberSecurity #CyberSecurityNews #SecurityNews
helpnetsecurity.com
Without cropped photo authentication, a routine crop can remove proof of origin and give manipulated images room to circulate without warning.
0
0
1