Features

Security and privacy strategies for CISOs in a mobile-first world

Security and privacy strategies for CISOs in a mobile-first world 2024-06-12 at 07:01 By Mirko Zorz In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must shift their approach to data security, acknowledging the complexities introduced by mobile access to […]

React to this headline:

Loading spinner

Security and privacy strategies for CISOs in a mobile-first world Read More »

How AI-powered attacks are accelerating the shift to zero trust strategies

How AI-powered attacks are accelerating the shift to zero trust strategies 2024-06-05 at 07:01 By Mirko Zorz In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats. Markey discusses the impact of emerging threats like AI-generated

React to this headline:

Loading spinner

How AI-powered attacks are accelerating the shift to zero trust strategies Read More »

How to combat alert fatigue in cybersecurity

How to combat alert fatigue in cybersecurity 2024-05-28 at 07:31 By Mirko Zorz In this Help Net Security interview, Ken Gramley, CEO at Stamus Networks, discusses the primary causes of alert fatigue in cybersecurity and DevOps environments. Alert fatigue results from the overwhelming volume of event data generated by security tools, the prevalence of false

React to this headline:

Loading spinner

How to combat alert fatigue in cybersecurity Read More »

Strategies for transitioning to a SASE architecture

Strategies for transitioning to a SASE architecture 2024-05-23 at 07:33 By Mirko Zorz In this Help Net Security, Prakash Mana, CEO at Cloudbrink, discusses the primary challenges companies face when transitioning to a SASE architecture and how to overcome them. What are companies’ primary challenges when transitioning to a SASE architecture, and how can they

React to this headline:

Loading spinner

Strategies for transitioning to a SASE architecture Read More »

Strategies for combating AI-enhanced BEC attacks

Strategies for combating AI-enhanced BEC attacks 2024-05-21 at 07:31 By Mirko Zorz In this Help Net Security interview, Robert Haist, CISO at TeamViewer, discusses how AI is being leveraged by cybercriminals to enhance the effectiveness of BEC scams. How is AI being leveraged by cybercriminals to enhance the effectiveness of BEC scams? BEC attacks are

React to this headline:

Loading spinner

Strategies for combating AI-enhanced BEC attacks Read More »

UK cannabis millionaire’s legal ‘deals on wheels’ via crypto

UK cannabis millionaire’s legal ‘deals on wheels’ via crypto 2024-05-15 at 19:01 By Cointelegraph by Jillian Godsil UK medical marijuana tycoon Maximillian White has embraced crypto and blockchain to help shift product around the world. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

UK cannabis millionaire’s legal ‘deals on wheels’ via crypto Read More »

Core security measures to strengthen privacy and data protection programs

Core security measures to strengthen privacy and data protection programs 2024-05-15 at 08:01 By Mirko Zorz As privacy laws evolve globally, organizations face increasing complexity in adapting their data protection strategies to stay compliant. In this Help Net Security interview, Kabir Barday, CEO at OneTrust, emphasizes that embracing privacy by design enables organizations to navigate

React to this headline:

Loading spinner

Core security measures to strengthen privacy and data protection programs Read More »

Tailoring responsible AI: Defining ethical guidelines for industry-specific use

Tailoring responsible AI: Defining ethical guidelines for industry-specific use 2024-05-14 at 07:01 By Mirko Zorz In this Help Net Security interview, Chris Peake, CISO & SVP at Smartsheet, explains how responsible AI should be defined by each organization to guide their AI development and usage. Peake emphasizes that implementing responsible AI requires balancing ethical considerations,

React to this headline:

Loading spinner

Tailoring responsible AI: Defining ethical guidelines for industry-specific use Read More »

Establishing a security baseline for open source projects

Establishing a security baseline for open source projects 2024-05-13 at 08:01 By Mirko Zorz In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) and opportunities for overcoming these challenges. The OpenSSF community has developed open-source security tools and projects, aiming

React to this headline:

Loading spinner

Establishing a security baseline for open source projects Read More »

‘Sic AI’s on each other’ to solve artificial intelligence threat: David Brin, author

‘Sic AI’s on each other’ to solve artificial intelligence threat: David Brin, author 2024-05-09 at 19:03 By Cointelegraph by Andrew Fenton Best-selling sci-fi author David Brin says AIs could be made to police each other under threat of losing blockchain-based registration. This article is an excerpt from Cointelegraph.com News View Original Source React to this

React to this headline:

Loading spinner

‘Sic AI’s on each other’ to solve artificial intelligence threat: David Brin, author Read More »

What do crypto market makers actually do? Liquidity, or manipulation

What do crypto market makers actually do? Liquidity, or manipulation 2024-05-08 at 19:01 By Cointelegraph by Yohan Yun The role of crypto market makers is poorly understood: do they simply ensure crypto trades go through… or do they manipulate crypto markets? This article is an excerpt from Cointelegraph.com News View Original Source React to this

React to this headline:

Loading spinner

What do crypto market makers actually do? Liquidity, or manipulation Read More »

Strategies for preventing AI misuse in cybersecurity

Strategies for preventing AI misuse in cybersecurity 2024-05-06 at 08:01 By Mirko Zorz As organizations increasingly adopt AI, they face unique challenges in updating AI models to keep pace with evolving threats while ensuring seamless integration into existing cybersecurity frameworks. In this Help Net Security interview, Pukar Hamal, CEO at SecurityPal, discusses the integration of

React to this headline:

Loading spinner

Strategies for preventing AI misuse in cybersecurity Read More »

How to prepare for the CISSP exam: Tips from industry leaders

How to prepare for the CISSP exam: Tips from industry leaders 2024-05-06 at 07:31 By Mirko Zorz The Certified Information Systems Security Professional (CISSP) is the most widely recognized certification in the information security industry. CISSP certifies that an information security professional possesses extensive technical and managerial expertise for designing, engineering, and managing an organization’s

React to this headline:

Loading spinner

How to prepare for the CISSP exam: Tips from industry leaders Read More »

Understanding emerging AI and data privacy regulations

Understanding emerging AI and data privacy regulations 2024-05-02 at 08:01 By Mirko Zorz In this Help Net Security interview, Sophie Stalla-Bourdillon, Senior Privacy Counsel & Legal Engineer at Immuta, discusses the AI Act, the Data Act, and the Health Data Space Regulation. Learn how these regulations interact, their implications for both public and private sectors,

React to this headline:

Loading spinner

Understanding emerging AI and data privacy regulations Read More »

Meme coins: Betrayal of crypto’s ideals… or its true purpose?

Meme coins: Betrayal of crypto’s ideals… or its true purpose? 2024-05-01 at 19:01 By Cointelegraph by Felix Ng Meme coin fans think “serious” crypto investors are mid-curving it. Serious crypto investors think meme coin fans are idiots. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Meme coins: Betrayal of crypto’s ideals… or its true purpose? Read More »

Making cybersecurity more appealing to women, closing the skills gap

Making cybersecurity more appealing to women, closing the skills gap 2024-05-01 at 07:31 By Mirko Zorz In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women face in the cybersecurity industry. Davis emphasizes the need for proactive strategies to attract diverse talent, improve mentorship opportunities,

React to this headline:

Loading spinner

Making cybersecurity more appealing to women, closing the skills gap Read More »

Triangulation fraud: The costly scam hitting online retailers

Triangulation fraud: The costly scam hitting online retailers 2024-04-30 at 08:01 By Mirko Zorz In this Help Net Security interview, Mike Lemberger, Visa’s SVP, Chief Risk Officer, North America, discusses the severe financial losses resulting from triangulation fraud, estimating monthly losses to range from $660 million to $1 billion among merchants. He also highlights the

React to this headline:

Loading spinner

Triangulation fraud: The costly scam hitting online retailers Read More »

68% of Runes are in the red — Are they really an upgrade for Bitcoin?

68% of Runes are in the red — Are they really an upgrade for Bitcoin? 2024-04-29 at 19:04 By Cointelegraph by Yohan Yun Bitcoin Runes’ debut stirred controversy with high fees and poor initial returns, but supporters say the tokens upgrade the Bitcoin network. This article is an excerpt from Cointelegraph.com News View Original Source

React to this headline:

Loading spinner

68% of Runes are in the red — Are they really an upgrade for Bitcoin? Read More »

Overcoming GenAI challenges in healthcare cybersecurity

Overcoming GenAI challenges in healthcare cybersecurity 2024-04-25 at 07:01 By Mirko Zorz In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on patient privacy. What are the key cybersecurity challenges in healthcare in the context of GenAI, and how can they

React to this headline:

Loading spinner

Overcoming GenAI challenges in healthcare cybersecurity Read More »

7 ICO alternatives for blockchain fundraising: Crypto airdrops, IDOs & more

7 ICO alternatives for blockchain fundraising: Crypto airdrops, IDOs & more 2024-04-24 at 19:02 By Cointelegraph by Jillian Godsil Airdrops, presales and gaming NFTs are among the innovative ways crypto projects are raising funds with tokens in the post-ICO era. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

7 ICO alternatives for blockchain fundraising: Crypto airdrops, IDOs & more Read More »

Scroll to Top