cybersecurity

IT security and government services: Balancing transparency and security

IT security and government services: Balancing transparency and security 2024-10-22 at 07:33 By Help Net Security Government information technology leaders find themselves at a challenging balance point: On one end of the scale are increasing threats from cyber actors, bolstered by advanced technology like artificial intelligence (AI); on the other end is a longstanding commitment […]

React to this headline:

Loading spinner

IT security and government services: Balancing transparency and security Read More »

Myths holding women back from cybersecurity careers

Myths holding women back from cybersecurity careers 2024-10-22 at 06:33 By Mirko Zorz In this Help Net Security interview, Dr Kathryn Jones, Head of School, Computer Science and Informatics at Cardiff University, discusses the challenges and misconceptions that deter women from pursuing careers in cybersecurity. Dr Jones also outlines the diverse skills, mentorship, and outreach

React to this headline:

Loading spinner

Myths holding women back from cybersecurity careers Read More »

Hackers are finding new ways to leverage AI

Hackers are finding new ways to leverage AI 2024-10-22 at 06:20 By Help Net Security AI adoption and integration has continued its rapid momentum within the hacking community, according to Bugcrowd. Nevertheless, it continues to pose both benefits and unfortunate cyber risks. This year’s report revealed a significant shift in the perceived value of AI

React to this headline:

Loading spinner

Hackers are finding new ways to leverage AI Read More »

Building secure AI with MLSecOps

Building secure AI with MLSecOps 2024-10-21 at 07:31 By Mirko Zorz In this Help Net Security interview, Ian Swanson, CEO of Protect AI, discusses the concept of “secure AI by design.” By adopting frameworks like Machine Learning Security Operations (MLSecOps) and focusing on transparency, organizations can build resilient AI systems that are both safe and

React to this headline:

Loading spinner

Building secure AI with MLSecOps Read More »

Should the CISOs role be split into two functions?

Should the CISOs role be split into two functions? 2024-10-21 at 06:01 By Help Net Security 84% of CISOs believe the role needs to be split into two functions – one technical and one business-focused, to maximize security and organizational resilience, according to Trellix. Regulatory demands pose a growing challenge for CISOs The research reveals

React to this headline:

Loading spinner

Should the CISOs role be split into two functions? Read More »

Despite massive security spending, 44% of CISOs fail to detect breaches

Despite massive security spending, 44% of CISOs fail to detect breaches 2024-10-18 at 07:31 By Help Net Security Despite global information security spending projected to reach $215 billion in 2024, 44% of CISOs surveyed reported they were unable to detect a data breach in the last 12 months using existing security tools, according to Gigamon.

React to this headline:

Loading spinner

Despite massive security spending, 44% of CISOs fail to detect breaches Read More »

What to do if your iPhone or Android smartphone gets stolen?

What to do if your iPhone or Android smartphone gets stolen? 2024-10-18 at 07:01 By Help Net Security A lost, stolen, or compromised smartphone today means we are in serious trouble. Most people have everything related to their personal and professional lives stored on their phones, a fact that criminals are well aware of. Cybersecurity

React to this headline:

Loading spinner

What to do if your iPhone or Android smartphone gets stolen? Read More »

Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime’s constant rise is becoming everyone’s problem 2024-10-18 at 06:31 By Help Net Security Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced, forcing organizations to constantly adapt their defenses. The rise of deepfake technology, especially in creating realistic audio impersonations, poses new dangers.

React to this headline:

Loading spinner

Cybercrime’s constant rise is becoming everyone’s problem Read More »

How NIS2 will impact sectors from healthcare to energy

How NIS2 will impact sectors from healthcare to energy 2024-10-17 at 07:02 By Mirko Zorz In this Help Net Security interview, Mick Baccio, Global Security Advisor at Splunk SURGe, discusses the far-reaching implications of the NIS2 Directive beyond traditional IT security. He explains how NIS2 will fundamentally change cybersecurity governance, making it a core aspect

React to this headline:

Loading spinner

How NIS2 will impact sectors from healthcare to energy Read More »

AI data collection under fire

AI data collection under fire 2024-10-17 at 06:32 By Help Net Security A recent Cohesity report found that consumers are highly concerned about the information companies collect from them – especially when it`s used for artificial intelligence – with consumers prepared to punish companies by switching providers for any loss of trust. In this Help

React to this headline:

Loading spinner

AI data collection under fire Read More »

Why companies are struggling to keep up with SaaS data protection

Why companies are struggling to keep up with SaaS data protection 2024-10-17 at 06:01 By Help Net Security While businesses increasingly rely on SaaS tools, many leaders are not fully confident in their ability to safeguard their data, according to Keepit. Growing concerns over SaaS data protection According to the survey, while 28% of respondents

React to this headline:

Loading spinner

Why companies are struggling to keep up with SaaS data protection Read More »

Resilience over reliance: Preparing for IT failures in an unpredictable digital world

Resilience over reliance: Preparing for IT failures in an unpredictable digital world 2024-10-16 at 07:31 By Help Net Security No IT system — no matter how advanced – is completely immune to failure. The promise of a digital ring of steel may sound attractive, but can it protect you against hardware malfunctions? Software bugs? Unexpected

React to this headline:

Loading spinner

Resilience over reliance: Preparing for IT failures in an unpredictable digital world Read More »

Strengthening Kubernetes security posture with these essential steps

Strengthening Kubernetes security posture with these essential steps 2024-10-16 at 07:01 By Mirko Zorz In this Help Net Security interview, Paolo Mainardi, CTO at SparkFabrik, discusses comprehensive strategies to secure Kubernetes environments from development through deployment. He focuses on best practices, automation, and continuous monitoring. Many security risks in Kubernetes originate from vulnerable container images.

React to this headline:

Loading spinner

Strengthening Kubernetes security posture with these essential steps Read More »

Unlocking the value of AI-powered identity security

Unlocking the value of AI-powered identity security 2024-10-16 at 06:01 By Help Net Security While most organizations are still in the early horizons of their identity security journey, those who achieve maturity are seeing disproportionately higher returns for every dollar spent​, according to SailPoint. Identity security adoption still in early stages The value of identity

React to this headline:

Loading spinner

Unlocking the value of AI-powered identity security Read More »

The NHI management challenge: When employees leave

The NHI management challenge: When employees leave 2024-10-15 at 08:01 By Help Net Security An employee is exiting your organization. Regardless of the terms of departure, an ex-staffer has the potential when they leave or change roles to impact a wide range of non-human identities, digital credentials, and other secrets. Those secrets include the credentials

React to this headline:

Loading spinner

The NHI management challenge: When employees leave Read More »

How nation-states exploit political instability to launch cyber operations

How nation-states exploit political instability to launch cyber operations 2024-10-15 at 07:37 By Mirko Zorz In this Help Net Security interview, Ismael Valenzuela, Vice President of Threat Research & Intelligence at BlackBerry, discusses the impact of geopolitical tensions on the frequency and sophistication of cyberattacks. He explains how nation-states and politically motivated groups exploit unrest

React to this headline:

Loading spinner

How nation-states exploit political instability to launch cyber operations Read More »

The dark side of API security

The dark side of API security 2024-10-15 at 07:02 By Help Net Security APIs are the backbone of digital transformation efforts, connecting applications across organizations, so their security is of the utmost importance. In this Help Net Security video, Lori MacVittie, a Distinguished Engineer at F5, discusses the current state of API security. A recent

React to this headline:

Loading spinner

The dark side of API security Read More »

Data breaches trigger increase in cyber insurance claims

Data breaches trigger increase in cyber insurance claims 2024-10-15 at 06:31 By Help Net Security Cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data and privacy breach incidents, according to Allianz. Cyber claims frequency exceeds €1 million The frequency of large cyber claims (>€1

React to this headline:

Loading spinner

Data breaches trigger increase in cyber insurance claims Read More »

The quantum dilemma: Game-changer or game-ender

The quantum dilemma: Game-changer or game-ender 2024-10-14 at 08:18 By Help Net Security If someone told you five years ago that you could pose questions to an AI agent about the most vexing issues in science and it could answer back swiftly and meaningfully, you would’ve thought they were joking. But AI has ushered in

React to this headline:

Loading spinner

The quantum dilemma: Game-changer or game-ender Read More »

CISOs’ strategies for managing a growing attack surface

CISOs’ strategies for managing a growing attack surface 2024-10-14 at 07:03 By Mirko Zorz In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital transformation. Carlsson highlights the challenges CISOs face today, including maintaining visibility and managing compliance in

React to this headline:

Loading spinner

CISOs’ strategies for managing a growing attack surface Read More »

Scroll to Top