automation

How to build AI into your business without breaking compliance

How to build AI into your business without breaking compliance 2025-06-11 at 08:02 By Mirko Zorz AI is supposed to make businesses faster, smarter, and more competitive, but most projects fall short. The Cloud Security Alliance (CSA) says the real issue is companies cramming AI into old, rigid processes that just can’t keep up. “AI […]

React to this headline:

Loading spinner

How to build AI into your business without breaking compliance Read More »

CISOs prioritize AI-driven automation to optimize cybersecurity spending

CISOs prioritize AI-driven automation to optimize cybersecurity spending 2025-05-29 at 08:04 By Help Net Security Cybersecurity leaders and consultants identified AI-driven automation and cost optimization as top organizational priorities, according to Wipro. 30% of respondents are investing in AI automation to enhance their cybersecurity operations. AI-driven automation can help in detecting and responding to threats

React to this headline:

Loading spinner

CISOs prioritize AI-driven automation to optimize cybersecurity spending Read More »

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules 2025-05-07 at 08:32 By Mirko Zorz Application security is changing fast. In this Help Net Security interview, Loris Gutic, Global CISO at Bright, talks about what it takes to keep up. Gutic explains how DevOps, containers, and serverless tools are shaping security, and shares

React to this headline:

Loading spinner

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules Read More »

AI and automation shift the cybersecurity balance toward attackers

AI and automation shift the cybersecurity balance toward attackers 2025-05-02 at 09:02 By Help Net Security Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet. The post AI and automation shift the cybersecurity balance toward attackers appeared first on Help Net Security.

React to this headline:

Loading spinner

AI and automation shift the cybersecurity balance toward attackers Read More »

What’s worth automating in cyber hygiene, and what’s not

What’s worth automating in cyber hygiene, and what’s not 2025-04-29 at 09:05 By Mirko Zorz Cyber hygiene sounds simple. Patch your systems, remove old accounts, update your software. But for large organizations, this gets messy fast. Systems number in the thousands. Teams are scattered. Some machines haven’t been rebooted in months. Automation can help. But

React to this headline:

Loading spinner

What’s worth automating in cyber hygiene, and what’s not Read More »

Want faster products and stronger trust? Build security in, not bolt it on

Want faster products and stronger trust? Build security in, not bolt it on 2025-04-29 at 08:42 By Mirko Zorz In this Help Net Security interview, Christopher Kennedy, CISO at Group 1001, discusses how cybersecurity initiatives are reshaping enterprise cybersecurity strategy. He explains why security must be embedded across IT, business lines, and product development, how

React to this headline:

Loading spinner

Want faster products and stronger trust? Build security in, not bolt it on Read More »

Exposure validation emerges as critical cyber defense component

Exposure validation emerges as critical cyber defense component 2025-04-25 at 08:13 By Help Net Security Organizations have implemented various aspects of threat exposure validation, including security control validation (51%) and filtering threat exposures based on the effectiveness of security controls to mitigate threats (48%), according to Cymulate. At the same time, nearly all respondents say

React to this headline:

Loading spinner

Exposure validation emerges as critical cyber defense component Read More »

54% of tech hiring managers expect layoffs in 2025

54% of tech hiring managers expect layoffs in 2025 2025-04-22 at 18:22 By Help Net Security 54% of tech hiring managers say their companies are likely to conduct layoffs within the next year, and 45% say employees whose roles can be replaced by AI are most likely to be let go, according to a new

React to this headline:

Loading spinner

54% of tech hiring managers expect layoffs in 2025 Read More »

Forward-thinking CISOs are shining a light on shadow IT

Forward-thinking CISOs are shining a light on shadow IT 2025-04-04 at 08:32 By Mirko Zorz In this Help Net Security interview, Curtis Simpson, CISO and Chief Advocacy Officer at Armis, discusses how CISOs can balance security and innovation while managing the risks of shadow IT. Rather than focusing on restrictive policies, fostering proactive partnerships with

React to this headline:

Loading spinner

Forward-thinking CISOs are shining a light on shadow IT Read More »

5 pitfalls that can delay cyber incident response and recovery

5 pitfalls that can delay cyber incident response and recovery 2025-03-20 at 08:35 By Help Net Security The responsibility of cyber incident response falls squarely on the shoulders of the CISO. And many CISOs invest heavily in technical response procedures, tabletop exercises and theoretical plans only to find out that when an actual breach strikes

React to this headline:

Loading spinner

5 pitfalls that can delay cyber incident response and recovery Read More »

How AI and automation are reshaping security leadership

How AI and automation are reshaping security leadership 2025-03-18 at 16:02 By Help Net Security The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous agentic AI, according to Tines. Additionally, the promise of security automation is coming to fruition. In theory and practice, security

React to this headline:

Loading spinner

How AI and automation are reshaping security leadership Read More »

Security Validation Firm Pentera Banks $60M Series D  

Security Validation Firm Pentera Banks $60M Series D   2025-03-12 at 20:03 By SecurityWeek News Israeli startup in the automated security validation space secures a $60 million round led by Evolution Equity Partners. The post Security Validation Firm Pentera Banks $60M Series D   appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Security Validation Firm Pentera Banks $60M Series D   Read More »

Debunking 5 myths about network automation

Debunking 5 myths about network automation 2025-02-27 at 06:02 By Help Net Security Imagine you’re a network engineer at an enterprise. You already have your hands full with IT priorities, including managing bandwidth related to working from home, the company’s new data center, and, more recently, computing needs to support AI adoption. Additionally, the security

React to this headline:

Loading spinner

Debunking 5 myths about network automation Read More »

Man vs. machine: Striking the perfect balance in threat intelligence

Man vs. machine: Striking the perfect balance in threat intelligence 2025-02-24 at 08:00 By Mirko Zorz In this Help Net Security interview, Aaron Roberts, Director at Perspective Intelligence, discusses how automation is reshaping threat intelligence. He explains that while AI tools can process massive data sets, the nuanced judgment of experienced analysts remains critical. Roberts

React to this headline:

Loading spinner

Man vs. machine: Striking the perfect balance in threat intelligence Read More »

Unknown and unsecured: The risks of poor asset visibility

Unknown and unsecured: The risks of poor asset visibility 2025-02-20 at 07:34 By Mirko Zorz In this Help Net Security interview, Juliette Hudson, CTO of CybaVerse, discusses why asset visibility remains a critical cybersecurity challenge. She explains how to maintain security without slowing down operations, shares ways to improve visibility in OT environments, and explains

React to this headline:

Loading spinner

Unknown and unsecured: The risks of poor asset visibility Read More »

Acronis CISO on why backup strategies fail and how to make them resilient

Acronis CISO on why backup strategies fail and how to make them resilient 2025-01-22 at 07:07 By Mirko Zorz In this Help Net Security interview, Gerald Beuchelt, CISO at Acronis, discusses common backup strategy pitfalls, reasons for backup failures, and offers actionable advice for organizations looking to improve their backup and recovery processes. The post

React to this headline:

Loading spinner

Acronis CISO on why backup strategies fail and how to make them resilient Read More »

Scaling penetration testing through smart automation

Scaling penetration testing through smart automation 2025-01-08 at 07:06 By Mirko Zorz In this Help Net Security interview, Marko Simeonov, CEO of Plainsea, discusses how organizations can move beyond compliance-driven penetration testing toward a more strategic, risk-based approach. He explains how automation, human expertise, and continuous monitoring can transform penetration testing into a dynamic, business-critical

React to this headline:

Loading spinner

Scaling penetration testing through smart automation Read More »

The future of data and AI: Seven trends shaping 2025 and beyond

The future of data and AI: Seven trends shaping 2025 and beyond 2024-12-27 at 07:31 By Help Net Security In 2025, seven trends will shape the future of data and AI, offering advantages for those who see these changes not as challenges but as opportunities to innovate and excel. The post The future of data

React to this headline:

Loading spinner

The future of data and AI: Seven trends shaping 2025 and beyond Read More »

Key steps to scaling automated compliance while maintaining security

Key steps to scaling automated compliance while maintaining security 2024-12-18 at 07:01 By Mirko Zorz In this Help Net Security interview, Vivek Agarwal, Privacy Program Manager at Meta Platforms, shares insights on strategies for reducing time to market, improving vendor onboarding, and updating privacy requirements to ensure compliance across third-party contracts. From leveraging automation and

React to this headline:

Loading spinner

Key steps to scaling automated compliance while maintaining security Read More »

Building a robust security posture with limited resources

Building a robust security posture with limited resources 2024-12-06 at 07:03 By Mirko Zorz In this Help Net Security interview, Gareth Lindahl-Wise, CISO at Ontinue, discusses how business leaders can align innovation with cybersecurity, tackle the risks posed by legacy systems, and build defenses for startups. Lindahl-Wise also highlights collaboration and strategic planning as essential

React to this headline:

Loading spinner

Building a robust security posture with limited resources Read More »

Scroll to Top