
Cybersecurity

How CISOs can elevate cybersecurity in boardroom discussions – Help Net Security
Ross Young is the CISO in residence at Team8 and the creator of the OWASP Threat and Safeguard Matrix (TaSM). In this interview, he shares his perspective on how cybersecurity professionals can tailor their presentations to the board, aligning security strategies with business priorities. He also discusses common misconceptions that boards have about cybersecurity and…
![⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January] ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]](https://i3.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-GVBzJbXbnB628INcZeeGpxnFqxVpcaOaQnUH-g2FpiUGHCsUnPnPNYeuEKDvxOqHzeiB2fZWoNTOO81_P4b77zyyyuaSpWTBjahKirJJMtMXCEIvVUiqsIojlnyGL9pPkB8Dv5-wviS5poLJ_CIYdbkSxjPE4Psyh6mppkjg0M4rWF22fNSR9IgRUqwh/s728-rw-e365/recap.png?w=600&resize=600,400&ssl=1)
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]
Jan 13, 2025Ravie Lakshmanan The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but so are the ways to protect yourself. In this recap, we’ll break down what’s happening, why it matters, and what you…

35 cybersecurity statistics to lose sleep over in 2025
Hackers and data miners continue to become more sophisticated, malicious and greedy. Even the general public has become aware of security threats and incidents that splash across news headlines. In other words, you don’t have to be an enterprise IT pro to understand the latest security risks. That’s the easy part. The hard part…
![⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]](https://i2.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKokWQpcRQ55ARtaBLhn4X9RCRcf5u5YW7JaJaQrIrcU6A96dBP2IS5th1jhuZX0cQMO04KAMOZDxqEIcPdkAqGmkXMpHzV7L_CECca3FJ_ppgWQh9J0y8D02mSQbw-nzuf-FzDIN412s_F2AO-MGpfr95e-yMTzPjQqkl-WKo8jY1o6XMVvnF7bEmngEk/s728-rw-e365/recap.png?w=600&resize=600,400&ssl=1)
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
Jan 06, 2025Ravie Lakshmanan Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for attackers. The line between convenience and vulnerability has never been thinner….

Top 7 Enterprise Cybersecurity Challenges in 2025
When was the last “easy” year for enterprise security teams? Certainly not last year, this decade or even this century. Every year in recent memory has seen its share of noteworthy and novel cyberattacks. It doesn’t take a crystal ball to predict 2025 will be more of the same. If anything, the pace and…

Cybersecurity Lags in Middle East Business Development
COMMENTARY The Middle East is undergoing a digital transformation that is as rapid as it is remarkable. Tech multinationals are investing big in the region as Dubai, Riyadh, and Abu Dhabi strive to establish themselves as global innovation hubs. But this increased digitization comes with an increased risk of cyberattacks — and businesses throughout the…

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
Dec 30, 2025Ravie LakshmananCybersecurity / Hacking News Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it’s a hidden flaw in popular software or a clever new attack method, staying informed is key to protecting…

The Most Dangerous People on the Internet in 2024
For its entire existence as a global medium, the internet’s evolution has been caught in a tug of war, pulled by opposing forces: on one side, moderation and control; on the other, disruption and anarchy. This year, the most prominent actors weighing in on the side of disruption were familiar faces: The reckless oligarchs, cybercriminals,…

The Worst Hacks of 2024
Every year has its own mix of digital security debacles, from the absurd to the sinister, but 2024 was particularly marked by hacking sprees in which cybercriminals and state-backed espionage groups repeatedly exploited the same weakness or type of target to fuel their frenzy. For attackers, the approach is ruthlessly efficient, but for compromised institutions—and…

Achieving cybersecurity compliance in 5 steps
Business Security Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements 03 Dec 2024 • , 6 min. read We’ve all been there – creating short- or long-term plans to achieve certain personal goals. However, business planning often…