Features

Securing digital products under the Cyber Resilience Act

Securing digital products under the Cyber Resilience Act 2025-04-18 at 08:37 By Mirko Zorz In this Help Net Security interview, Dr. Dag Flachet, co-founder at Codific, explains what the Cyber Resilience Act (CRA) means for companies and how it compares to GDPR in terms of regulatory complexity and impact on organizations. He discusses the technical […]

React to this headline:

Loading spinner

Securing digital products under the Cyber Resilience Act Read More »

When AI agents go rogue, the fallout hits the enterprise

When AI agents go rogue, the fallout hits the enterprise 2025-04-17 at 08:45 By Mirko Zorz In this Help Net Security interview, Jason Lord, CTO at AutoRABIT, discusses the cybersecurity risks posed by AI agents integrated into real-world systems. Issues like hallucinations, prompt injections, and embedded biases can turn these systems into vulnerable targets. Lord

React to this headline:

Loading spinner

When AI agents go rogue, the fallout hits the enterprise Read More »

When companies merge, so do their cyber threats

When companies merge, so do their cyber threats 2025-04-16 at 09:13 By Mirko Zorz For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open the door to serious cybersecurity threats that may derail the transaction. Strong due diligence, smart risk planning, and a shared security

React to this headline:

Loading spinner

When companies merge, so do their cyber threats Read More »

Cybercriminal groups embrace corporate structures to scale, sustain operations

Cybercriminal groups embrace corporate structures to scale, sustain operations 2025-04-15 at 08:33 By Mirko Zorz In this Help Net Security interview, Sandy Kronenberg, CEO of Netarx, discusses how cybercriminal groups are adopting corporate structures and employee incentives to scale operations, retain talent, and evade detection. He covers the strategic collaborations behind major attacks, business-like parallels,

React to this headline:

Loading spinner

Cybercriminal groups embrace corporate structures to scale, sustain operations Read More »

The quiet data breach hiding in AI workflows

The quiet data breach hiding in AI workflows 2025-04-14 at 08:30 By Mirko Zorz As AI becomes embedded in daily business workflows, the risk of data exposure increases. Prompt leaks are not rare exceptions. They are a natural outcome of how employees use large language models. CISOs cannot treat this as a secondary concern. To

React to this headline:

Loading spinner

The quiet data breach hiding in AI workflows Read More »

Why security culture is crypto’s strongest asset

Why security culture is crypto’s strongest asset 2025-04-11 at 08:46 By Mirko Zorz In this Help Net Security interview, Norah Beers, CISO at Grayscale, discusses key security challenges in managing crypto assets, adversary tactics, private key management, and securing both hot and cold wallets. From a threat modeling perspective, what unique adversary tactics do you

React to this headline:

Loading spinner

Why security culture is crypto’s strongest asset Read More »

Why CISOs are doubling down on cyber crisis simulations

Why CISOs are doubling down on cyber crisis simulations 2025-04-09 at 09:03 By Mirko Zorz Cyber threats aren’t going away, and CISOs know prevention isn’t enough. Being ready to respond is just as important. Cyber crisis simulations offer a way to test that readiness. They let teams walk through real-world scenarios in a controlled setting,

React to this headline:

Loading spinner

Why CISOs are doubling down on cyber crisis simulations Read More »

Transforming cybersecurity into a strategic business enabler

Transforming cybersecurity into a strategic business enabler 2025-04-09 at 08:20 By Mirko Zorz In this Help Net Security interview, Kevin Serafin, CISO at Ecolab, discusses aligning security strategy with long-term business goals, building strong partnerships across the organization, and approaching third-party risk with agility. How do you define cyber risk within your organization’s overall enterprise

React to this headline:

Loading spinner

Transforming cybersecurity into a strategic business enabler Read More »

Observability is security’s way back into the cloud conversation

Observability is security’s way back into the cloud conversation 2025-04-08 at 08:02 By Mirko Zorz In this Help Net Security interview, Esteban Gutierrez, CISO and VP of Information Security at New Relic, discusses how the adoption of cloud infrastructure is outpacing security readiness. He shares strategies for overcoming common misconfigurations and optimizing access controls in

React to this headline:

Loading spinner

Observability is security’s way back into the cloud conversation Read More »

CISOs battle security platform fatigue

CISOs battle security platform fatigue 2025-04-07 at 08:31 By Mirko Zorz It starts with good intentions. A tool to stop phishing. Another to monitor endpoints. One more for cloud workloads. Soon, a well-meaning CISO finds themselves managing dozens of products across teams, each with its own dashboard, alerts, and licensing headaches. Welcome to the age

React to this headline:

Loading spinner

CISOs battle security platform fatigue Read More »

The shift to identity-first security and why it matters

The shift to identity-first security and why it matters 2025-04-07 at 08:10 By Mirko Zorz In this Help Net Security interview, Arun Shrestha, CEO at BeyondID, discusses how AI is transforming secure access management for both attackers and defenders. He discusses the shift toward identity-first security, and the role of contextual and continuous authentication in

React to this headline:

Loading spinner

The shift to identity-first security and why it matters Read More »

Forward-thinking CISOs are shining a light on shadow IT

Forward-thinking CISOs are shining a light on shadow IT 2025-04-04 at 08:32 By Mirko Zorz In this Help Net Security interview, Curtis Simpson, CISO and Chief Advocacy Officer at Armis, discusses how CISOs can balance security and innovation while managing the risks of shadow IT. Rather than focusing on restrictive policies, fostering proactive partnerships with

React to this headline:

Loading spinner

Forward-thinking CISOs are shining a light on shadow IT Read More »

Building a cybersecurity strategy that survives disruption

Building a cybersecurity strategy that survives disruption 2025-04-03 at 08:14 By Mirko Zorz Cybersecurity isn’t what it used to be. Attackers are moving quicker, disruptions happen all the time, and many security plans built for more predictable times just can’t keep up. With everything from ransomware to geopolitical threats to cloud slip-ups hitting companies, there’s

React to this headline:

Loading spinner

Building a cybersecurity strategy that survives disruption Read More »

Balancing data protection and clinical usability in healthcare

Balancing data protection and clinical usability in healthcare 2025-04-02 at 08:01 By Mirko Zorz In this Help Net Security interview, Aaron Weismann, CISO at Main Line Health, discusses the growing ransomware threat in healthcare and why the sector remains a prime target. He explains the difficulties of protecting patient information, securing legacy systems, and maintaining

React to this headline:

Loading spinner

Balancing data protection and clinical usability in healthcare Read More »

Generative AI Is reshaping financial fraud. Can security keep up?

Generative AI Is reshaping financial fraud. Can security keep up? 2025-04-01 at 07:35 By Mirko Zorz In this Help Net Security interview, Yinglian Xie, CEO at DataVisor, explains how evolving fraud tactics require adaptive, AI-driven prevention strategies. With fraudsters using generative AI to launch sophisticated attacks, financial institutions must adopt adaptive AI solutions to stay

React to this headline:

Loading spinner

Generative AI Is reshaping financial fraud. Can security keep up? Read More »

The hidden costs of security tool bloat and how to fix it

The hidden costs of security tool bloat and how to fix it 2025-03-27 at 08:07 By Mirko Zorz In this Help Net Security interview, Shane Buckley, President and CEO at Gigamon, discusses why combating tool bloat is a top priority for CISOs as they face tighter budgets and expanding security stacks. Buckley shares insights on

React to this headline:

Loading spinner

The hidden costs of security tool bloat and how to fix it Read More »

How healthcare CISOs can balance security and accessibility without compromising care

How healthcare CISOs can balance security and accessibility without compromising care 2025-03-20 at 08:35 By Mirko Zorz In this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare data and what organizations can do to stay ahead. He shares insights on vendor management, zero trust, and

React to this headline:

Loading spinner

How healthcare CISOs can balance security and accessibility without compromising care Read More »

Moving beyond checkbox security for true resilience

Moving beyond checkbox security for true resilience 2025-03-19 at 08:13 By Mirko Zorz In this Help Net Security interview, William Booth, director, ATT&CK Evaluations at MITRE, discusses how CISOs can integrate regulatory compliance with proactive risk management, prioritize spending based on threat-informed assessments, and address overlooked vulnerabilities like shadow IT and software supply chain risks.

React to this headline:

Loading spinner

Moving beyond checkbox security for true resilience Read More »

How financial institutions can minimize their attack surface

How financial institutions can minimize their attack surface 2025-03-18 at 08:01 By Mirko Zorz In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He also shares insights on balancing compliance with agility, lessons from regulatory audits, and Discover’s approach to risk management and workforce development.

React to this headline:

Loading spinner

How financial institutions can minimize their attack surface Read More »

Quantifying cyber risk strategies to resonate with CFOs and boards

Quantifying cyber risk strategies to resonate with CFOs and boards 2025-03-14 at 17:02 By Mirko Zorz In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a more strategic role within their organizations. He explains that aligning cybersecurity

React to this headline:

Loading spinner

Quantifying cyber risk strategies to resonate with CFOs and boards Read More »

Scroll to Top