Compliance

Modeling organizations’ defensive mechanisms with MITRE D3FEND

Modeling organizations’ defensive mechanisms with MITRE D3FEND 15/11/2023 at 09:02 By Mirko Zorz Funded by the National Security Agency, MITRE’s D3FEND framework is helping to provide standardization, specificity, and repeatability needed by cybersecurity engineers. As the framework moves from the beta version to version 1.0 in 2024, we asked D3FEND creator Peter Kaloroumakis how D3FEND […]

React to this headline:

Loading spinner

Modeling organizations’ defensive mechanisms with MITRE D3FEND Read More »

4 warning signs that your low-code development needs DevSecOps

4 warning signs that your low-code development needs DevSecOps 14/11/2023 at 09:31 By Help Net Security Low code platforms have democratized development in the enterprise. They improve efficiency and enable companies to do more with less. But as you begin to do more you will start hitting speed bumps that eventually become roadblocks. If your

React to this headline:

Loading spinner

4 warning signs that your low-code development needs DevSecOps Read More »

The cloud skills gap is digital transformation’s Achilles’ heel

The cloud skills gap is digital transformation’s Achilles’ heel 14/11/2023 at 07:01 By Help Net Security 98% of organizations globally are facing a cloud skills gap, specifically in trying to find people with general cloud skills, cloud architecture knowledge, and adapting, monitoring, and troubleshooting for the cloud, according to a report by SoftwareOne. This is

React to this headline:

Loading spinner

The cloud skills gap is digital transformation’s Achilles’ heel Read More »

Data protection demands AI-specific security strategies

Data protection demands AI-specific security strategies 10/11/2023 at 07:32 By Help Net Security Adoption and use of AI tools is high across organizations, however many are concerned about the impacts AI will have on their larger data security strategy, according to Immuta. Only half of the respondents say their organization’s data security strategy is keeping

React to this headline:

Loading spinner

Data protection demands AI-specific security strategies Read More »

Organizations lack the skills and headcount to manage Kubernetes

Organizations lack the skills and headcount to manage Kubernetes 10/11/2023 at 07:02 By Help Net Security The Kubernetes industry is undergoing rapid change and evolution due to the growth of edge computing, the acceleration of AI, and the pressing need to modernize Kubernetes management in response to increasing technology scale and complexity, according to Spectro

React to this headline:

Loading spinner

Organizations lack the skills and headcount to manage Kubernetes Read More »

Unpacking the challenges of anti-money laundering obligations

Unpacking the challenges of anti-money laundering obligations 09/11/2023 at 08:32 By Help Net Security When managing anti-money laundering (AML) obligations, many challenger banks turn to basic or unproven in-house risk management solutions. Although these solutions can, in some ways, be innovative, they are often built quickly and lack thorough testing, leading to potential vulnerabilities. In

React to this headline:

Loading spinner

Unpacking the challenges of anti-money laundering obligations Read More »

Protecto Joins Cadre of Startups in AI Data Protection Space

Protecto Joins Cadre of Startups in AI Data Protection Space 08/11/2023 at 21:47 By Ryan Naraine Silicon Valley startup is pitching APIs to help organizations protect data and ensure compliance throughout the AI deployment lifecycle. The post Protecto Joins Cadre of Startups in AI Data Protection Space appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Protecto Joins Cadre of Startups in AI Data Protection Space Read More »

Companies have good reasons to be concerned about generative AI

Companies have good reasons to be concerned about generative AI 08/11/2023 at 07:32 By Help Net Security Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data security, and more, according to Portal26. Two-thirds of respondents admitted to a Generative AI security

React to this headline:

Loading spinner

Companies have good reasons to be concerned about generative AI Read More »

The perils of over-reliance on single cloud providers

The perils of over-reliance on single cloud providers 06/11/2023 at 07:39 By Help Net Security The risk associated with dependence on a particular cloud provider for multiple business capabilities is in the top five emerging risks for organizations for the second consecutive quarter, according to a survey by Gartner. Emerging risks In September 2023, Gartner

React to this headline:

Loading spinner

The perils of over-reliance on single cloud providers Read More »

AI is transforming financial crime compliance

AI is transforming financial crime compliance 03/11/2023 at 07:01 By Help Net Security While 86% of compliance, operations, risk and IT professionals at banks and non-banking financial institutions (NBFIs) surveyed said they would increase spending on AI and ML over the next two years, a 93% of respondents said that instead of using automation to

React to this headline:

Loading spinner

AI is transforming financial crime compliance Read More »

Why legacy system patching can’t wait

Why legacy system patching can’t wait 02/11/2023 at 07:32 By Help Net Security The persistent neglect of patching legacy systems is plaguing critical infrastructure and industries. The consequences of such neglect can be damaging to organizations, ranging from costly security vulnerabilities to compliance risk and operational inefficiencies. Thus, the question remains: why is the process

React to this headline:

Loading spinner

Why legacy system patching can’t wait Read More »

Mainframes are around to stay, it’s time to protect them

Mainframes are around to stay, it’s time to protect them 01/11/2023 at 07:31 By Help Net Security While many organizations run their core business applications on the mainframe, IT leaders lack confidence in the effectiveness of their mainframe security compliance, signaling a need for more robust security practices, according to Rocket Software. For decades, mainframe

React to this headline:

Loading spinner

Mainframes are around to stay, it’s time to protect them Read More »

How security observability can help you fight cyber attacks

How security observability can help you fight cyber attacks 31/10/2023 at 08:31 By Help Net Security Security observability uses the external outputs of a system, its logs, metrics, and traces to infer risk, monitor threats, and alert on breaches. Security professionals use this close observation of system behavior to detect, understand, and stop new and

React to this headline:

Loading spinner

How security observability can help you fight cyber attacks Read More »

Proofpoint to Acquire Tessian for AI-Powered Email Security Tech

Proofpoint to Acquire Tessian for AI-Powered Email Security Tech 30/10/2023 at 18:46 By Ryan Naraine Proofpoint removes a formidable competitor from the crowded email security market and adds technology to address risk from misdirected emails. The post Proofpoint to Acquire Tessian for AI-Powered Email Security Tech appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Proofpoint to Acquire Tessian for AI-Powered Email Security Tech Read More »

Strategies to overcome cybersecurity misconceptions

Strategies to overcome cybersecurity misconceptions 25/10/2023 at 07:02 By Help Net Security Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net Security video, Kevin Kirkwood, Deputy CISO at LogRhythm, stresses that one of the most significant pitfalls

React to this headline:

Loading spinner

Strategies to overcome cybersecurity misconceptions Read More »

Navigating OT/IT convergence and securing ICS environments

Navigating OT/IT convergence and securing ICS environments 23/10/2023 at 07:33 By Help Net Security Escalating threats to operational technology (OT) have prompted an increasing number of global enterprises to adopt sophisticated technologies and services to enhance the security of their assets. In this Help Net Security video, Christopher Warner, Senior GRC-OT Security Consultant at GuidePoint

React to this headline:

Loading spinner

Navigating OT/IT convergence and securing ICS environments Read More »

Scaling rapidly? Your application security strategies need to keep up

Scaling rapidly? Your application security strategies need to keep up 23/10/2023 at 07:01 By Help Net Security Modern application security strategies must support and enable modern software development, even as it rapidly scales, according to Mend.io. Just 52% of companies can effectively remediate critical vulnerabilities and only 41% are confident they can manage the security

React to this headline:

Loading spinner

Scaling rapidly? Your application security strategies need to keep up Read More »

The collaborative power of CISOs, CTOs and CIOs for a secure future

The collaborative power of CISOs, CTOs and CIOs for a secure future 17/10/2023 at 07:03 By Mirko Zorz In this Help Net Security interview, Phil Venables, CISO at Google Cloud, discusses the results of a recent Google report on board collaboration with the C-suite — particularly the CIO, CTO, and CISO to stay current with

React to this headline:

Loading spinner

The collaborative power of CISOs, CTOs and CIOs for a secure future Read More »

Keeping control in complex regulatory environments

Keeping control in complex regulatory environments 16/10/2023 at 06:02 By Help Net Security Modern compliance programs represent a strategic shift in how companies approach regulatory and ethical obligations. They are designed to not only mitigate risks and avoid legal repercussions but also to enhance an organization’s reputation, foster a culture of integrity, and ultimately drive

React to this headline:

Loading spinner

Keeping control in complex regulatory environments Read More »

Unmasking the limitations of yearly penetration tests

Unmasking the limitations of yearly penetration tests 12/10/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Charles d’Hondt, Head of Operations, Ambionics Security, talks about the necessity of implementing continuous penetration testing because yearly ones are not enough. They leave blind spots and cannot match the security needs of regular releases and

React to this headline:

Loading spinner

Unmasking the limitations of yearly penetration tests Read More »

Scroll to Top