Compliance

Key steps to scaling automated compliance while maintaining security

Key steps to scaling automated compliance while maintaining security 2024-12-18 at 07:01 By Mirko Zorz In this Help Net Security interview, Vivek Agarwal, Privacy Program Manager at Meta Platforms, shares insights on strategies for reducing time to market, improving vendor onboarding, and updating privacy requirements to ensure compliance across third-party contracts. From leveraging automation and […]

React to this headline:

Loading spinner

Key steps to scaling automated compliance while maintaining security Read More »

Trustwave’s 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges

Trustwave’s 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges 2024-12-17 at 17:39 By Kevin Kerr As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Here is the latest installment. This

React to this headline:

Loading spinner

Trustwave’s 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges Read More »

With DORA approaching, financial institutions must strengthen their cyber resilience

With DORA approaching, financial institutions must strengthen their cyber resilience 2024-12-16 at 07:33 By Help Net Security The clock is ticking for financial institutions across the EU as the January 17, 2025, deadline for the Digital Operational Resilience Act (DORA) approaches. This regulation will reshape how organizations in the financial sector approach cybersecurity and operational

React to this headline:

Loading spinner

With DORA approaching, financial institutions must strengthen their cyber resilience Read More »

We must adjust expectations for the CISO role

We must adjust expectations for the CISO role 2024-12-12 at 11:52 By Help Net Security Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information security officer (CISO) role, once a back-office function primarily focused on technical oversight, has moved squarely into the executive spotlight.

React to this headline:

Loading spinner

We must adjust expectations for the CISO role Read More »

Preventing data leakage in low-node/no-code environments

Preventing data leakage in low-node/no-code environments 2024-12-10 at 07:34 By Help Net Security Low-code/no-code (LCNC) platforms enable application development by citizen developers, often generating “shadow engineering” projects that evade security oversight. While LCNC solutions like Power BI reports and automated workflows foster agility and innovation, they also introduce significant risks, including data leakage. Data leakage

React to this headline:

Loading spinner

Preventing data leakage in low-node/no-code environments Read More »

Strengthening security posture with comprehensive cybersecurity assessments

Strengthening security posture with comprehensive cybersecurity assessments 2024-12-10 at 07:04 By Mirko Zorz In this Help Net Security interview, Phani Dasari, CISO at HGS, discusses key aspects of cybersecurity assessments, including effective tools and methodologies, the role of AI and automation, and strategies for aligning assessments with organizational needs. The post Strengthening security posture with

React to this headline:

Loading spinner

Strengthening security posture with comprehensive cybersecurity assessments Read More »

Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks

Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks 2024-12-04 at 07:21 By Mirko Zorz In this Help Net Security interview, Niv Braun, CEO at Noma Security, discusses the difficulties security teams face due to the fragmented nature of AI processes, tools, and teams across the data and AI lifecycle. Braun also shares insights

React to this headline:

Loading spinner

Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks Read More »

Treat AI like a human: Redefining cybersecurity

Treat AI like a human: Redefining cybersecurity 2024-12-03 at 07:31 By Mirko Zorz In this Help Net Security interview, Doug Kersten, CISO of Appfire, explains how treating AI like a human can change the way cybersecurity professionals use AI tools. He discusses how this shift encourages a more collaborative approach while acknowledging AI’s limitations. Kersten

React to this headline:

Loading spinner

Treat AI like a human: Redefining cybersecurity Read More »

Trustwave’s 2025 Cybersecurity Predictions: AI as Powerful Ally for Cyber Defenders and Law Enforcement

Trustwave’s 2025 Cybersecurity Predictions: AI as Powerful Ally for Cyber Defenders and Law Enforcement 2024-12-02 at 16:03 By Ed Williams As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Over the next several

React to this headline:

Loading spinner

Trustwave’s 2025 Cybersecurity Predictions: AI as Powerful Ally for Cyber Defenders and Law Enforcement Read More »

The effect of compliance requirements on vulnerability management strategies

The effect of compliance requirements on vulnerability management strategies 2024-11-29 at 07:34 By Mirko Zorz In this Help Net Security interview, Steve Carter, CEO of Nucleus Security, discusses the ongoing challenges in vulnerability management, including prioritizing vulnerabilities and addressing patching delays. Carter also covers compliance requirements and how automation can streamline vulnerability management processes. Why

React to this headline:

Loading spinner

The effect of compliance requirements on vulnerability management strategies Read More »

Enhancing visibility for better security in multi-cloud and hybrid environments

Enhancing visibility for better security in multi-cloud and hybrid environments 2024-11-21 at 07:03 By Mirko Zorz In this Help Net Security interview, Brooke Motta, CEO of RAD Security, talks about how cloud-specific threats have evolved and what companies should be watching out for. She discusses the growing complexity of cloud environments and the importance of

React to this headline:

Loading spinner

Enhancing visibility for better security in multi-cloud and hybrid environments Read More »

Navigating the compliance labyrinth: A CSO’s guide to scaling security

Navigating the compliance labyrinth: A CSO’s guide to scaling security 2024-11-18 at 07:48 By Help Net Security Imagine navigating a labyrinth where the walls constantly shift, and the path ahead is obscured by fog. If this brings up a visceral image, you’ve either seen David Bowie’s iconic film or are very familiar with the real-world

React to this headline:

Loading spinner

Navigating the compliance labyrinth: A CSO’s guide to scaling security Read More »

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance 2024-11-14 at 22:03 By Let’s take a look at how traditional vulnerability assessment (VA) tools compare to those built specifically to assess database security. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance Read More »

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight 2024-11-13 at 16:03 By In today’s complex cybersecurity landscape, addressing the controls within the Australian Government’s Information Security Manual (ISM) and the Essential Eight (E8) is critical when seeking to build rapport and work with the Australian Government. Australian cybersecurity regulations like

React to this headline:

Loading spinner

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight Read More »

CISOs in 2025: Balancing security, compliance, and accountability

CISOs in 2025: Balancing security, compliance, and accountability 2024-11-13 at 07:37 By Mirko Zorz In this Help Net Security interview, Daniel Schwalbe, CISO at DomainTools, discusses the intensifying regulatory demands that have reshaped CISO accountability and daily decision-making. He outlines the skill sets future CISOs need, their key priorities for 2025, and how increased pressure

React to this headline:

Loading spinner

CISOs in 2025: Balancing security, compliance, and accountability Read More »

Strategies for CISOs navigating hybrid and multi-cloud security

Strategies for CISOs navigating hybrid and multi-cloud security 2024-11-11 at 07:11 By Mirko Zorz In this Help Net Security interview, Alex Freedland, CEO at Mirantis, discusses the cloud security challenges that CISOs need to tackle as multi-cloud and hybrid environments become the norm. He points out the expanded attack surfaces, the importance of consistent security

React to this headline:

Loading spinner

Strategies for CISOs navigating hybrid and multi-cloud security Read More »

CMMC 2.0, CORIE, DORA: Navigating Global Cybersecurity and Resilience Standard

CMMC 2.0, CORIE, DORA: Navigating Global Cybersecurity and Resilience Standard 2024-11-08 at 17:07 By Cybersecurity and operational resilience are paramount for organizations, especially those handling sensitive information. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

CMMC 2.0, CORIE, DORA: Navigating Global Cybersecurity and Resilience Standard Read More »

How AI will shape the next generation of cyber threats

How AI will shape the next generation of cyber threats 2024-11-07 at 08:08 By Mirko Zorz In this Help Net Security interview, Buzz Hillestad, CISO at Prismatic, discusses how AI’s advancement reshapes cybercriminal skillsets and lowers entry barriers for potential attackers. Hillestad highlights that, as AI tools become more accessible, organizations must adapt their defenses

React to this headline:

Loading spinner

How AI will shape the next generation of cyber threats Read More »

Maximizing security visibility on a budget

Maximizing security visibility on a budget 2024-11-05 at 07:03 By Mirko Zorz In this Help Net Security interview, Barry Mainz, CEO at Forescout, discusses the obstacles organizations encounter in attaining security visibility, particularly within cloud and hybrid environments. He explains why asset intelligence—going beyond basic visibility to understand device behavior and risk—is essential. Mainz also

React to this headline:

Loading spinner

Maximizing security visibility on a budget Read More »

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare 2024-11-01 at 15:02 By With the rise in cyberattacks and ransomware incidents, healthcare organizations face an increasing risk of data breaches that threaten patient privacy and HIPAA compliance. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare Read More »

Scroll to Top