Features

CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0

CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0 2024-06-25 at 06:31 By Mirko Zorz In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features, significant advantages, and innovative technologies behind Qualys CyberSecurity Asset Management 3.0. Can you explain the key features of Qualys CyberSecurity Asset …

CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0 Read More »

React to this headline:

Loading spinner

From passwords to passkeys: Enhancing security and user satisfaction

From passwords to passkeys: Enhancing security and user satisfaction 2024-06-20 at 07:01 By Mirko Zorz In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and improves user experience by simplifying the login process. Lamb also addresses the technical challenges and economic implications of …

From passwords to passkeys: Enhancing security and user satisfaction Read More »

React to this headline:

Loading spinner

Enhancing security through collaboration with the open-source community

Enhancing security through collaboration with the open-source community 2024-06-18 at 07:32 By Mirko Zorz In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the potential risks and benefits of collaborating with the open-source community to enhance software security. …

Enhancing security through collaboration with the open-source community Read More »

React to this headline:

Loading spinner

The rise of SaaS security teams

The rise of SaaS security teams 2024-06-17 at 07:31 By Mirko Zorz In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge in organizations establishing dedicated SaaS security teams is driven by significant data breaches involving widely used platforms. What motivated the recent surge in …

The rise of SaaS security teams Read More »

React to this headline:

Loading spinner

How businesses can integrate token technology into existing payment systems

How businesses can integrate token technology into existing payment systems 2024-06-13 at 07:02 By Mirko Zorz In this Help Net Security interview, Mark Nelsen, SVP and Global Head of Consumer Product at Visa, discusses the integration of token technology into existing payment systems. How do businesses integrate tokenization into their existing payment systems, and what …

How businesses can integrate token technology into existing payment systems Read More »

React to this headline:

Loading spinner

Security and privacy strategies for CISOs in a mobile-first world

Security and privacy strategies for CISOs in a mobile-first world 2024-06-12 at 07:01 By Mirko Zorz In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must shift their approach to data security, acknowledging the complexities introduced by mobile access to …

Security and privacy strategies for CISOs in a mobile-first world Read More »

React to this headline:

Loading spinner

How AI-powered attacks are accelerating the shift to zero trust strategies

How AI-powered attacks are accelerating the shift to zero trust strategies 2024-06-05 at 07:01 By Mirko Zorz In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats. Markey discusses the impact of emerging threats like AI-generated …

How AI-powered attacks are accelerating the shift to zero trust strategies Read More »

React to this headline:

Loading spinner

How to combat alert fatigue in cybersecurity

How to combat alert fatigue in cybersecurity 2024-05-28 at 07:31 By Mirko Zorz In this Help Net Security interview, Ken Gramley, CEO at Stamus Networks, discusses the primary causes of alert fatigue in cybersecurity and DevOps environments. Alert fatigue results from the overwhelming volume of event data generated by security tools, the prevalence of false …

How to combat alert fatigue in cybersecurity Read More »

React to this headline:

Loading spinner

Strategies for transitioning to a SASE architecture

Strategies for transitioning to a SASE architecture 2024-05-23 at 07:33 By Mirko Zorz In this Help Net Security, Prakash Mana, CEO at Cloudbrink, discusses the primary challenges companies face when transitioning to a SASE architecture and how to overcome them. What are companies’ primary challenges when transitioning to a SASE architecture, and how can they …

Strategies for transitioning to a SASE architecture Read More »

React to this headline:

Loading spinner

Strategies for combating AI-enhanced BEC attacks

Strategies for combating AI-enhanced BEC attacks 2024-05-21 at 07:31 By Mirko Zorz In this Help Net Security interview, Robert Haist, CISO at TeamViewer, discusses how AI is being leveraged by cybercriminals to enhance the effectiveness of BEC scams. How is AI being leveraged by cybercriminals to enhance the effectiveness of BEC scams? BEC attacks are …

Strategies for combating AI-enhanced BEC attacks Read More »

React to this headline:

Loading spinner

UK cannabis millionaire’s legal ‘deals on wheels’ via crypto

UK cannabis millionaire’s legal ‘deals on wheels’ via crypto 2024-05-15 at 19:01 By Cointelegraph by Jillian Godsil UK medical marijuana tycoon Maximillian White has embraced crypto and blockchain to help shift product around the world. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Core security measures to strengthen privacy and data protection programs

Core security measures to strengthen privacy and data protection programs 2024-05-15 at 08:01 By Mirko Zorz As privacy laws evolve globally, organizations face increasing complexity in adapting their data protection strategies to stay compliant. In this Help Net Security interview, Kabir Barday, CEO at OneTrust, emphasizes that embracing privacy by design enables organizations to navigate …

Core security measures to strengthen privacy and data protection programs Read More »

React to this headline:

Loading spinner

Tailoring responsible AI: Defining ethical guidelines for industry-specific use

Tailoring responsible AI: Defining ethical guidelines for industry-specific use 2024-05-14 at 07:01 By Mirko Zorz In this Help Net Security interview, Chris Peake, CISO & SVP at Smartsheet, explains how responsible AI should be defined by each organization to guide their AI development and usage. Peake emphasizes that implementing responsible AI requires balancing ethical considerations, …

Tailoring responsible AI: Defining ethical guidelines for industry-specific use Read More »

React to this headline:

Loading spinner

Establishing a security baseline for open source projects

Establishing a security baseline for open source projects 2024-05-13 at 08:01 By Mirko Zorz In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) and opportunities for overcoming these challenges. The OpenSSF community has developed open-source security tools and projects, aiming …

Establishing a security baseline for open source projects Read More »

React to this headline:

Loading spinner

‘Sic AI’s on each other’ to solve artificial intelligence threat: David Brin, author

‘Sic AI’s on each other’ to solve artificial intelligence threat: David Brin, author 2024-05-09 at 19:03 By Cointelegraph by Andrew Fenton Best-selling sci-fi author David Brin says AIs could be made to police each other under threat of losing blockchain-based registration. This article is an excerpt from Cointelegraph.com News View Original Source React to this …

‘Sic AI’s on each other’ to solve artificial intelligence threat: David Brin, author Read More »

React to this headline:

Loading spinner

What do crypto market makers actually do? Liquidity, or manipulation

What do crypto market makers actually do? Liquidity, or manipulation 2024-05-08 at 19:01 By Cointelegraph by Yohan Yun The role of crypto market makers is poorly understood: do they simply ensure crypto trades go through… or do they manipulate crypto markets? This article is an excerpt from Cointelegraph.com News View Original Source React to this …

What do crypto market makers actually do? Liquidity, or manipulation Read More »

React to this headline:

Loading spinner

Strategies for preventing AI misuse in cybersecurity

Strategies for preventing AI misuse in cybersecurity 2024-05-06 at 08:01 By Mirko Zorz As organizations increasingly adopt AI, they face unique challenges in updating AI models to keep pace with evolving threats while ensuring seamless integration into existing cybersecurity frameworks. In this Help Net Security interview, Pukar Hamal, CEO at SecurityPal, discusses the integration of …

Strategies for preventing AI misuse in cybersecurity Read More »

React to this headline:

Loading spinner

How to prepare for the CISSP exam: Tips from industry leaders

How to prepare for the CISSP exam: Tips from industry leaders 2024-05-06 at 07:31 By Mirko Zorz The Certified Information Systems Security Professional (CISSP) is the most widely recognized certification in the information security industry. CISSP certifies that an information security professional possesses extensive technical and managerial expertise for designing, engineering, and managing an organization’s …

How to prepare for the CISSP exam: Tips from industry leaders Read More »

React to this headline:

Loading spinner

Understanding emerging AI and data privacy regulations

Understanding emerging AI and data privacy regulations 2024-05-02 at 08:01 By Mirko Zorz In this Help Net Security interview, Sophie Stalla-Bourdillon, Senior Privacy Counsel & Legal Engineer at Immuta, discusses the AI Act, the Data Act, and the Health Data Space Regulation. Learn how these regulations interact, their implications for both public and private sectors, …

Understanding emerging AI and data privacy regulations Read More »

React to this headline:

Loading spinner

Meme coins: Betrayal of crypto’s ideals… or its true purpose?

Meme coins: Betrayal of crypto’s ideals… or its true purpose? 2024-05-01 at 19:01 By Cointelegraph by Felix Ng Meme coin fans think “serious” crypto investors are mid-curving it. Serious crypto investors think meme coin fans are idiots. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner
Scroll to Top