Compliance

Organizations are racing against time to meet the PCI DSS 4.0 deadline

Organizations are racing against time to meet the PCI DSS 4.0 deadline 19/09/2023 at 06:02 By Help Net Security Payment data security concerns remain widespread as organizations undertake significant lift to meet the PCI DSS 4.0 deadline, according to Bluefin. 94% of survey respondents said they have significant or very significant concerns pertaining to payment […]

React to this headline:

Loading spinner

Organizations are racing against time to meet the PCI DSS 4.0 deadline Read More »

The hidden dangers of low-value data

The hidden dangers of low-value data 18/09/2023 at 08:05 By Help Net Security In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to live, watch, and wait for the perfect moment to steal

React to this headline:

Loading spinner

The hidden dangers of low-value data Read More »

Regulatory activity forces compliance leaders to spend more on GRC tools

Regulatory activity forces compliance leaders to spend more on GRC tools 18/09/2023 at 07:48 By Help Net Security Legal and compliance department investment in GRC (governance, risk, and compliance) tools will increase 50% by 2026, according to Gartner. Assurance leaders are seeking out technology solutions to help them address increasing regulatory attention on executive risk

React to this headline:

Loading spinner

Regulatory activity forces compliance leaders to spend more on GRC tools Read More »

Great security training is a real challenge

Great security training is a real challenge 14/09/2023 at 07:31 By Help Net Security All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to be the largest vulnerability in organizations. For technology companies like SaaS providers, who also need to

React to this headline:

Loading spinner

Great security training is a real challenge Read More »

The critical role of authorization in safeguarding financial institutions

The critical role of authorization in safeguarding financial institutions 14/09/2023 at 07:01 By Help Net Security According to a recent Cost of Data Breach report, the financial industry has the second highest average cost for a data breach, making the value well worth financial institutions investing more into authorization. In this Help Net Security video,

React to this headline:

Loading spinner

The critical role of authorization in safeguarding financial institutions Read More »

Intel Capital Bets on Zenity for Low-Code/No-Code Security

Intel Capital Bets on Zenity for Low-Code/No-Code Security 12/09/2023 at 21:02 By Ryan Naraine Israeli security startup Zenity banks $16.5 million in new venture capital funding to work on ‘low-code/no-code’ security technology. The post Intel Capital Bets on Zenity for Low-Code/No-Code Security appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Intel Capital Bets on Zenity for Low-Code/No-Code Security Read More »

Strategies for harmonizing DevSecOps and AI

Strategies for harmonizing DevSecOps and AI 12/09/2023 at 07:32 By Help Net Security The same digital automation tools that have revolutionized workflows for developers are creating an uphill battle regarding security. From data breaches and cyberattacks to compliance concerns, the stakes have never been higher for enterprises to establish a robust and comprehensive security strategy.

React to this headline:

Loading spinner

Strategies for harmonizing DevSecOps and AI Read More »

The blueprint for a highly effective EASM solution

The blueprint for a highly effective EASM solution 11/09/2023 at 08:04 By Mirko Zorz In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should possess, and how it deals with uncovering hidden

React to this headline:

Loading spinner

The blueprint for a highly effective EASM solution Read More »

Unimplemented controls could derail your ESG compliance efforts

Unimplemented controls could derail your ESG compliance efforts 08/09/2023 at 06:01 By Help Net Security Two-thirds of organizations have not implemented environmental, social and governance (ESG) controls, and 60% do not currently perform internal ESG audits, according to a report by AuditBoard. Lack of ESG program readiness This lack of ESG program readiness raises the

React to this headline:

Loading spinner

Unimplemented controls could derail your ESG compliance efforts Read More »

Shifting left and right, innovating product security

Shifting left and right, innovating product security 07/09/2023 at 07:03 By Mirko Zorz In this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, fostering collaboration across business units and product lines, ensuring transparency and security in the supply chain, and meeting regulatory requirements

React to this headline:

Loading spinner

Shifting left and right, innovating product security Read More »

Baseline standards for BYOD access requirements

Baseline standards for BYOD access requirements 07/09/2023 at 06:02 By Help Net Security 49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources, according to a Jamf survey. With the summer

React to this headline:

Loading spinner

Baseline standards for BYOD access requirements Read More »

Compliance budgets under strain as inflation and workload grow

Compliance budgets under strain as inflation and workload grow 06/09/2023 at 06:33 By Help Net Security Compliance leaders are facing pressure to make the most of existing resources despite economic challenges and increased workload volume and complexity, according to Gartner. To face these challenges, leaders must address three crucial compliance function trends this year: tighter

React to this headline:

Loading spinner

Compliance budgets under strain as inflation and workload grow Read More »

The misconceptions preventing wider adoption of digital signatures

The misconceptions preventing wider adoption of digital signatures 05/09/2023 at 07:33 By Mirko Zorz In this Help Net Security interview, Thorsten Hau, CEO at fidentity, discusses the legal validity of qualified digital signatures, demonstrating their equivalence to handwritten signatures when backed by robust identity verification. Opting for certified providers that adhere to standards like eIDAS

React to this headline:

Loading spinner

The misconceptions preventing wider adoption of digital signatures Read More »

Understand the fine print of your cyber insurance policies

Understand the fine print of your cyber insurance policies 01/09/2023 at 06:32 By Help Net Security A significant gap is emerging between insurance providers, as organizations skip the fine print and seek affordable and comprehensive coverage, potentially putting them in a tough place when they need to use this safety net, according to a Delinea

React to this headline:

Loading spinner

Understand the fine print of your cyber insurance policies Read More »

Rising cyber incidents challenge healthcare organizations

Rising cyber incidents challenge healthcare organizations 30/08/2023 at 06:01 By Help Net Security Healthcare organizations are facing many cybersecurity challenges that require them to increasingly prioritize cybersecurity and compliance, according to Claroty. Threat actors are not only targeting IT systems, but have now set their sights on cyber-physical systems – from IoMT devices, to building

React to this headline:

Loading spinner

Rising cyber incidents challenge healthcare organizations Read More »

OpenAI Turns to Security to Sell ChatGPT Enterprise

OpenAI Turns to Security to Sell ChatGPT Enterprise 29/08/2023 at 21:03 By Ryan Naraine ChatGPT Enterprise is a corporate edition of ChatGPT that promises “enterprise-grade security” and a commitment not to use prompts and company data to train AI models. The post OpenAI Turns to Security to Sell ChatGPT Enterprise appeared first on SecurityWeek. This

React to this headline:

Loading spinner

OpenAI Turns to Security to Sell ChatGPT Enterprise Read More »

Is the cybersecurity community’s obsession with compliance counter-productive?

Is the cybersecurity community’s obsession with compliance counter-productive? 29/08/2023 at 07:01 By Help Net Security Does anyone think the chances of surviving a plane crash increase if our tray tables are locked and our carry-on bags are completely stowed under our seats? That we’ll be OK if the plane hits a mountain if we have

React to this headline:

Loading spinner

Is the cybersecurity community’s obsession with compliance counter-productive? Read More »

Adapting authentication to a cloud-centric landscape

Adapting authentication to a cloud-centric landscape 28/08/2023 at 07:33 By Mirko Zorz In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote workforces, the negative consequences of ineffective authorization, and how the shift toward cloud transformation affects authentication strategies. What are

React to this headline:

Loading spinner

Adapting authentication to a cloud-centric landscape Read More »

Lack of visibility into cloud access policies leaves enterprises flying blind

Lack of visibility into cloud access policies leaves enterprises flying blind 24/08/2023 at 06:00 By Help Net Security Fragmented access policies are top security concern in multi-cloud environments, with more than 75% of enterprises reporting they do not know where applications are deployed and who has access to them, according to Strata Identity. Cloud security

React to this headline:

Loading spinner

Lack of visibility into cloud access policies leaves enterprises flying blind Read More »

Network detection and response in the modern era

Network detection and response in the modern era 21/08/2023 at 07:04 By Mirko Zorz In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learning algorithms to

React to this headline:

Loading spinner

Network detection and response in the modern era Read More »

Scroll to Top