data

Cointelegraph joins forces with Nansen to boost crypto journalism with onchain data

Cointelegraph joins forces with Nansen to boost crypto journalism with onchain data 2025-06-16 at 19:00 By Cointelegraph by Cointelegraph Cointelegraph teams up with Nansen, the leading onchain analytics platform, to integrate real-time blockchain data into its content, empowering millions of crypto investors and teams with deeper insights into DeFi, Web3 and market trends. This article […]

React to this headline:

Loading spinner

Cointelegraph joins forces with Nansen to boost crypto journalism with onchain data Read More »

Identifying high-risk APIs across thousands of code repositories

Identifying high-risk APIs across thousands of code repositories 2025-06-12 at 16:02 By Mirko Zorz In this Help Net Security interview, Joni Klippert, CEO of StackHawk, discusses why API visibility is a major blind spot for security teams, how legacy tools fall short, and how StackHawk identifies risky APIs and sensitive data directly from code before

React to this headline:

Loading spinner

Identifying high-risk APIs across thousands of code repositories Read More »

The path to better cybersecurity isn’t more data, it’s less noise

The path to better cybersecurity isn’t more data, it’s less noise 2025-06-11 at 08:31 By Sinisa Markovic In cybersecurity, there’s an urge to collect as much data as possible. Logs, alerts, metrics, everything. But more data doesn’t necessarily translate to better security. SOCs deal with tens of thousands of alerts every day. It’s more than

React to this headline:

Loading spinner

The path to better cybersecurity isn’t more data, it’s less noise Read More »

Protecting patient data starts with knowing where it’s stored

Protecting patient data starts with knowing where it’s stored 2025-06-06 at 08:31 By Sinisa Markovic Patient data is often stored or processed outside the country where it was collected. When that happens, the data falls under the laws of the country where it resides. Depending on those laws, local governments may have legal access to

React to this headline:

Loading spinner

Protecting patient data starts with knowing where it’s stored Read More »

Why data provenance must anchor every CISO’s AI governance strategy

Why data provenance must anchor every CISO’s AI governance strategy 2025-05-28 at 08:30 By Help Net Security Across the enterprise, artificial intelligence has crept into core functions – not through massive digital transformation programs, but through quiet, incremental adoption. Legal departments are summarizing contracts. HR is rewording sensitive employee communications. Compliance teams are experimenting with

React to this headline:

Loading spinner

Why data provenance must anchor every CISO’s AI governance strategy Read More »

How OSINT supports financial crime investigations

How OSINT supports financial crime investigations 2025-05-05 at 08:31 By Mirko Zorz In this Help Net Security interview, Stuart Clarke, CEO at Blackdot Solutions, discusses the strategic use of open-source intelligence (OSINT) in tackling financial crime. He outlines its application in areas such as fraud, sanctions evasion, and money laundering, and addresses the legal, ethical,

React to this headline:

Loading spinner

How OSINT supports financial crime investigations Read More »

Securing digital products under the Cyber Resilience Act

Securing digital products under the Cyber Resilience Act 2025-04-18 at 08:37 By Mirko Zorz In this Help Net Security interview, Dr. Dag Flachet, co-founder at Codific, explains what the Cyber Resilience Act (CRA) means for companies and how it compares to GDPR in terms of regulatory complexity and impact on organizations. He discusses the technical

React to this headline:

Loading spinner

Securing digital products under the Cyber Resilience Act Read More »

How to manage and protect your biometric data

How to manage and protect your biometric data 2025-03-27 at 18:08 By Help Net Security Biometric data refers to unique physical or behavioral characteristics that are used to verify a person’s identity. Revoking or changing biometric data is more complicated than changing passwords. Unlike passwords, biometric identifiers like fingerprints or retina scans are unique and

React to this headline:

Loading spinner

How to manage and protect your biometric data Read More »

Protecting your personal information from data brokers

Protecting your personal information from data brokers 2025-03-24 at 18:01 By Help Net Security How aware are you that your personal information could be bought and sold without your consent—and that there are companies whose entire business model revolves around this? So, these companies, called data brokers, collect everything they can about you – where

React to this headline:

Loading spinner

Protecting your personal information from data brokers Read More »

53% of security teams lack continuous and up-to-date visibility

53% of security teams lack continuous and up-to-date visibility 2025-03-21 at 18:03 By Help Net Security Enterprises lack visibility into their own data, creating security risks that are compounding as organizations and their employees increase AI adoption, according to Bedrock Security. The majority of organizations struggle to track sensitive information across sprawling cloud environments, leaving

React to this headline:

Loading spinner

53% of security teams lack continuous and up-to-date visibility Read More »

AI will make ransomware even more dangerous

AI will make ransomware even more dangerous 2025-03-21 at 08:07 By Help Net Security Ransomware is the top predicted threat for 2025, which is especially concerning given 38% of security professionals say ransomware will become even more dangerous when powered by AI, according to Ivanti. In comparison to the threat level, only 29% of security

React to this headline:

Loading spinner

AI will make ransomware even more dangerous Read More »

Every minute, 4,080 records are compromised in data breaches

Every minute, 4,080 records are compromised in data breaches 2025-01-03 at 06:58 By Help Net Security A recent Domo report shows that the world’s internet population has reached a record high of 5.52 billion people and uncovers signs that AI may be unseating digital juggernauts as it brings in new forms of engagement. “The phenomenal

React to this headline:

Loading spinner

Every minute, 4,080 records are compromised in data breaches Read More »

Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks

Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks 2024-12-04 at 07:21 By Mirko Zorz In this Help Net Security interview, Niv Braun, CEO at Noma Security, discusses the difficulties security teams face due to the fragmented nature of AI processes, tools, and teams across the data and AI lifecycle. Braun also shares insights

React to this headline:

Loading spinner

Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks Read More »

Consumers have trust issues regarding how AI collects their data

Consumers have trust issues regarding how AI collects their data 2024-10-10 at 06:31 By Help Net Security Consumers worldwide are highly concerned about the information companies collect from them – especially when it’s used for AI, according to Cohesity. The majority of respondents (73% in the UK, 81% in the US and 82% in Australia)

React to this headline:

Loading spinner

Consumers have trust issues regarding how AI collects their data Read More »

Internal disconnects vs. cybersecurity: How connectivity shapes challenges

Internal disconnects vs. cybersecurity: How connectivity shapes challenges 2024-09-12 at 06:01 By Help Net Security Concerns about the trustworthiness of internal data exist in nearly all organizations globally, according to TeamViewer. 99% of business leaders pointed to factors undermining trust in internal data, citing multiple versions of the truth (38%), conflicting data management practices (32%)

React to this headline:

Loading spinner

Internal disconnects vs. cybersecurity: How connectivity shapes challenges Read More »

How to prioritize data privacy in core customer-facing systems

How to prioritize data privacy in core customer-facing systems 2024-08-27 at 07:45 By Help Net Security Evolving global data privacy regulations are keeping marketers on their toes. In April 2024, the American Privacy Rights Act (APRA) was introduced in the Senate. The proposed bill would create a federal consumer privacy framework akin to the GDPR,

React to this headline:

Loading spinner

How to prioritize data privacy in core customer-facing systems Read More »

GenAI buzz fading among senior executives

GenAI buzz fading among senior executives 2024-08-26 at 05:01 By Help Net Security GenAI adoption has reached a critical phase, with 67% of respondents reporting their organization is increasing its investment in GenAI due to strong value to date, according to Deloitte. “The State of Generative AI in the Enterprise: Now decides Next,” is based

React to this headline:

Loading spinner

GenAI buzz fading among senior executives Read More »

Scaling data security solutions: What you need to know

Scaling data security solutions: What you need to know 2024-08-06 at 07:01 By Mirko Zorz In this Help Net Security interview, Bruno Kurtic, President and CEO at Bedrock Security, discusses the role of data visibility in enhancing cybersecurity. He explains that effective data visibility involves discovering, classifying, and contextualizing data, which helps organizations understand and

React to this headline:

Loading spinner

Scaling data security solutions: What you need to know Read More »

Threat intelligence: A blessing and a curse?

Threat intelligence: A blessing and a curse? 2024-08-01 at 07:31 By Help Net Security Access to timely and accurate threat intelligence is now core to security operations for many organizations. Today, it seems that security teams are blessed with an abundance of data and intelligence feeds to choose from. However, selecting the right information from

React to this headline:

Loading spinner

Threat intelligence: A blessing and a curse? Read More »

Insecure file-sharing practices in healthcare put patient privacy at risk

Insecure file-sharing practices in healthcare put patient privacy at risk 2024-07-30 at 06:01 By Help Net Security Healthcare organizations continue to put their business and patients at risk of exposing their most sensitive data, according to Metomic. 25% of publicly shared files owned by healthcare organizations contain Personally Identifiable Information (PII). 68% of private files

React to this headline:

Loading spinner

Insecure file-sharing practices in healthcare put patient privacy at risk Read More »

Scroll to Top