Expert corner

IoT needs more respect for its consumers, creations, and itself

IoT needs more respect for its consumers, creations, and itself 2024-10-31 at 07:58 By Help Net Security Yet again, connected devices are in the news for all the wrong reasons. In October, security researchers found that robot vacuums from Chinese company, Ecovacs, can be compromised via a backdoor. In one case, hackers gained control over […]

React to this headline:

Loading spinner

IoT needs more respect for its consumers, creations, and itself Read More »

Risk hunting: A proactive approach to cyber threats

Risk hunting: A proactive approach to cyber threats 2024-10-30 at 07:34 By Help Net Security Cybersecurity is an overly reactive industry. Too often we act like firefighters, rushing from blaze to blaze, extinguishing flames hoping to keep the damage to a minimum, rather than fire suppression experts designing environments that refuse to burn. Just consider

React to this headline:

Loading spinner

Risk hunting: A proactive approach to cyber threats Read More »

A good cyber leader prioritizes the greater good

A good cyber leader prioritizes the greater good 2024-10-28 at 08:01 By Help Net Security In the war against malicious cyber activity, it’s time for security vendors to step in – and it’s not how you might think. CISA Director Jen Easterly put it right at this year’s Black Hat conference: “We got ourselves into

React to this headline:

Loading spinner

A good cyber leader prioritizes the greater good Read More »

Achieving peak cyber resilience

Achieving peak cyber resilience 2024-10-25 at 08:03 By Help Net Security Climbing Mount Everest isn’t a feat for the faint hearted. Extreme weather, dangerous terrain and acclimatization requirements make the trek challenging for even the most experienced climbers. It’s estimated that the expedition takes more than two months, on average. That’s a lengthy process that

React to this headline:

Loading spinner

Achieving peak cyber resilience Read More »

What’s more important when hiring for cybersecurity roles?

What’s more important when hiring for cybersecurity roles? 2024-10-24 at 08:03 By Help Net Security When building a cybersecurity team, you likely asked yourself, “Should I focus on certifications or real-world skills?” And since you rarely encounter entry-level candidates who can hit the ground running, naturally, you’d consider a candidate with both. But that’s not

React to this headline:

Loading spinner

What’s more important when hiring for cybersecurity roles? Read More »

IT security and government services: Balancing transparency and security

IT security and government services: Balancing transparency and security 2024-10-22 at 07:33 By Help Net Security Government information technology leaders find themselves at a challenging balance point: On one end of the scale are increasing threats from cyber actors, bolstered by advanced technology like artificial intelligence (AI); on the other end is a longstanding commitment

React to this headline:

Loading spinner

IT security and government services: Balancing transparency and security Read More »

Resilience over reliance: Preparing for IT failures in an unpredictable digital world

Resilience over reliance: Preparing for IT failures in an unpredictable digital world 2024-10-16 at 07:31 By Help Net Security No IT system — no matter how advanced – is completely immune to failure. The promise of a digital ring of steel may sound attractive, but can it protect you against hardware malfunctions? Software bugs? Unexpected

React to this headline:

Loading spinner

Resilience over reliance: Preparing for IT failures in an unpredictable digital world Read More »

The NHI management challenge: When employees leave

The NHI management challenge: When employees leave 2024-10-15 at 08:01 By Help Net Security An employee is exiting your organization. Regardless of the terms of departure, an ex-staffer has the potential when they leave or change roles to impact a wide range of non-human identities, digital credentials, and other secrets. Those secrets include the credentials

React to this headline:

Loading spinner

The NHI management challenge: When employees leave Read More »

The quantum dilemma: Game-changer or game-ender

The quantum dilemma: Game-changer or game-ender 2024-10-14 at 08:18 By Help Net Security If someone told you five years ago that you could pose questions to an AI agent about the most vexing issues in science and it could answer back swiftly and meaningfully, you would’ve thought they were joking. But AI has ushered in

React to this headline:

Loading spinner

The quantum dilemma: Game-changer or game-ender Read More »

Widening talent pool in cyber with on-demand contractors

Widening talent pool in cyber with on-demand contractors 2024-10-10 at 08:01 By Help Net Security Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread the workload on, you risk burning out security professionals. Many make

React to this headline:

Loading spinner

Widening talent pool in cyber with on-demand contractors Read More »

The role of self-sovereign identity in enterprises

The role of self-sovereign identity in enterprises 2024-10-08 at 07:31 By Help Net Security As personal data becomes increasingly commodified and centralized, the need for individuals to reclaim control over their identities has never been more urgent. Meanwhile, traditional identity systems used by enterprises often expose sensitive information to unnecessary risk, leaving both users and

React to this headline:

Loading spinner

The role of self-sovereign identity in enterprises Read More »

The case for enterprise exposure management

The case for enterprise exposure management 2024-10-07 at 08:01 By Help Net Security For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and remediate issues, had broad purview,

React to this headline:

Loading spinner

The case for enterprise exposure management Read More »

Three hard truths hindering cloud-native detection and response

Three hard truths hindering cloud-native detection and response 2024-10-03 at 08:01 By Help Net Security According to Gartner, the market for cloud computing services is expected to reach $675 billion in 2024. Companies are shifting from testing the waters of cloud computing to making substantive investments in cloud-native IT, and attackers are shifting with them.

React to this headline:

Loading spinner

Three hard truths hindering cloud-native detection and response Read More »

3 easy microsegmentation projects

3 easy microsegmentation projects 2024-10-01 at 07:31 By Help Net Security Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device service connectivity. One web server should connect to specific databases but not to others, or load balancers should connect to some web servers while

React to this headline:

Loading spinner

3 easy microsegmentation projects Read More »

Could APIs be the undoing of AI?

Could APIs be the undoing of AI? 2024-09-30 at 08:01 By Help Net Security Application programming interfaces (APIs) are essential to how generative AI (GenAI) functions with agents (e.g., calling upon them for data). But the combination of API and LLM issues coupled with rapid rollouts is likely to see numerous organizations having to combat

React to this headline:

Loading spinner

Could APIs be the undoing of AI? Read More »

3 tips for securing IoT devices in a connected world

3 tips for securing IoT devices in a connected world 2024-09-27 at 08:01 By Help Net Security IoT devices have become integral to how many organizations operate. From Smart TVs in conference rooms to connected sensors and wireless security cameras, these connected devices are now a fixture in the modern workplace. They also, however, present

React to this headline:

Loading spinner

3 tips for securing IoT devices in a connected world Read More »

AI use: 3 essential questions every CISO must ask

AI use: 3 essential questions every CISO must ask 2024-09-26 at 07:32 By Help Net Security In July, Wall Street experienced its worst day since 2022, with the tech-focused Nasdaq falling by 3.6%. The downturn was largely triggered by what commentators suggest is the result of underwhelming earnings from some major tech companies. What’s notable

React to this headline:

Loading spinner

AI use: 3 essential questions every CISO must ask Read More »

How to detect and stop bot activity

How to detect and stop bot activity 2024-09-20 at 07:46 By Help Net Security Bad bot traffic continues to rise year-over-year, accounting for nearly a third of all internet traffic in 2023. Bad bots access sensitive data, perpetrate fraud, steal proprietary information, and degrade site performance. New technologies are enabling fraudsters to strike faster and

React to this headline:

Loading spinner

How to detect and stop bot activity Read More »

Differential privacy in AI: A solution creating more problems for developers?

Differential privacy in AI: A solution creating more problems for developers? 2024-09-19 at 08:01 By Help Net Security In the push for secure AI models, many organizations have turned to differential privacy. But is the very tool meant to protect user data holding back innovation? Developers face a tough choice: balance data privacy or prioritize

React to this headline:

Loading spinner

Differential privacy in AI: A solution creating more problems for developers? Read More »

Data disposal and cyber hygiene: Building a culture of security within your organization

Data disposal and cyber hygiene: Building a culture of security within your organization 2024-09-19 at 06:31 By Help Net Security Data breach episodes have been constantly rising with the number of data breach victims crossing 1 billion in the first half of 2024. A recent Data Breach Report 2023 by Verizon confirms that 74% of

React to this headline:

Loading spinner

Data disposal and cyber hygiene: Building a culture of security within your organization Read More »

Scroll to Top