Features

The misconceptions preventing wider adoption of digital signatures

The misconceptions preventing wider adoption of digital signatures 05/09/2023 at 07:33 By Mirko Zorz In this Help Net Security interview, Thorsten Hau, CEO at fidentity, discusses the legal validity of qualified digital signatures, demonstrating their equivalence to handwritten signatures when backed by robust identity verification. Opting for certified providers that adhere to standards like eIDAS […]

React to this headline:

Loading spinner

The misconceptions preventing wider adoption of digital signatures Read More »

What does optimal software security analysis look like?

What does optimal software security analysis look like? 31/08/2023 at 07:01 By Mirko Zorz In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools for software security. He explains how these tools can complement human knowledge to enhance software security analysis and emphasizes the need

React to this headline:

Loading spinner

What does optimal software security analysis look like? Read More »

How to protect your crypto in a volatile market: Bitcoin OGs and experts weigh in

How to protect your crypto in a volatile market: Bitcoin OGs and experts weigh in 30/08/2023 at 17:02 By Cointelegraph By Jillian Godsil Crypto OGs Brock Pierce and Tim Draper and other experts provide essential advice on how to protect your hard-earned stack. This article is an excerpt from Cointelegraph.com News View Original Source React

React to this headline:

Loading spinner

How to protect your crypto in a volatile market: Bitcoin OGs and experts weigh in Read More »

What makes a good ASM solution stand out

What makes a good ASM solution stand out 29/08/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that organizations should redefine their attack surface concept and discusses proactive measures they can take to strengthen their

React to this headline:

Loading spinner

What makes a good ASM solution stand out Read More »

Adapting authentication to a cloud-centric landscape

Adapting authentication to a cloud-centric landscape 28/08/2023 at 07:33 By Mirko Zorz In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote workforces, the negative consequences of ineffective authorization, and how the shift toward cloud transformation affects authentication strategies. What are

React to this headline:

Loading spinner

Adapting authentication to a cloud-centric landscape Read More »

IEEE 802.11az provides security enhancements, solves longstanding problems

IEEE 802.11az provides security enhancements, solves longstanding problems 25/08/2023 at 07:04 By Mirko Zorz In this Help Net Security interview, Jonathan Segev, IEEE 802.11 Task Group (TG) Chair of next-generation positioning (TGaz) at IEEE, discusses IEEE 802.11az. The new standard will enable accuracy to less than 0.1 meters, which is a significant improvement from the

React to this headline:

Loading spinner

IEEE 802.11az provides security enhancements, solves longstanding problems Read More »

AI and the evolution of surveillance systems

AI and the evolution of surveillance systems 24/08/2023 at 07:01 By Mirko Zorz In this Help Net Security interview, Gerwin van der Lugt, CTO at Oddity, discusses the future of surveillance and AI’s influence. He also delves into how organizations can prevent their systems from perpetuating biases or violating individual rights. What precautions are in

React to this headline:

Loading spinner

AI and the evolution of surveillance systems Read More »

Recursive inscriptions: Bitcoin ‘supercomputer’ and BTC DeFi coming soon

Recursive inscriptions: Bitcoin ‘supercomputer’ and BTC DeFi coming soon 23/08/2023 at 16:47 By Cointelegraph By Max Parasol Recursive inscription proponents claim the tech can bring DeFi to Bitcoin, create an on-chain AWS competitor — and even a BTC “supercomputer.“ This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Recursive inscriptions: Bitcoin ‘supercomputer’ and BTC DeFi coming soon Read More »

Anticipating the next wave of IoT cybersecurity challenges

Anticipating the next wave of IoT cybersecurity challenges 23/08/2023 at 07:01 By Mirko Zorz In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected environments, examining the broadening attack surface and the nuanced complexities this evolution imposes. Atoui also delves

React to this headline:

Loading spinner

Anticipating the next wave of IoT cybersecurity challenges Read More »

Maintaining consistent security in diverse cloud infrastructures

Maintaining consistent security in diverse cloud infrastructures 22/08/2023 at 07:01 By Mirko Zorz As cloud infrastructures become increasingly API-driven and dynamically spread across expansive attack surfaces, achieving clarity proves difficult. Compounding this challenge is the integration of DevOps practices, microservices, and container technologies, which, while fostering agility and scalability, introduce additional layers of complexity and

React to this headline:

Loading spinner

Maintaining consistent security in diverse cloud infrastructures Read More »

8 open-source OSINT tools you should try

8 open-source OSINT tools you should try 22/08/2023 at 06:01 By Help Net Security Open-Source Intelligence (OSINT) refers to gathering, assessing, and interpreting public information to address specific intelligence queries. All the tools listed here are available for free. Amass The OWASP Amass project performs network mapping of attack surfaces and external asset discovery using

React to this headline:

Loading spinner

8 open-source OSINT tools you should try Read More »

Network detection and response in the modern era

Network detection and response in the modern era 21/08/2023 at 07:04 By Mirko Zorz In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learning algorithms to

React to this headline:

Loading spinner

Network detection and response in the modern era Read More »

Reinventing OT security for dynamic landscapes

Reinventing OT security for dynamic landscapes 18/08/2023 at 07:05 By Mirko Zorz From understanding the challenges of disparate OT protocols and the increasing convergence with IT to grappling with the monumental role of human error, our latest interview with Rohit Bohara, CTO at asvin, delves deep into the landscape of OT security. As cloud solutions

React to this headline:

Loading spinner

Reinventing OT security for dynamic landscapes Read More »

The road ahead for ecommerce fraud prevention

The road ahead for ecommerce fraud prevention 17/08/2023 at 07:36 By Mirko Zorz Ecommerce platforms are incorporating sophisticated fraud detection measures, but fraudsters, too, are refining their strategies. In this Help Net Security interview, Eduardo Mônaco, CEO at ClearSale, explains the complexities of ecommerce fraud, discussing the evolution of fraudster tactics, the effectiveness of social

React to this headline:

Loading spinner

The road ahead for ecommerce fraud prevention Read More »

How CISOs break down complex security challenges

How CISOs break down complex security challenges 16/08/2023 at 07:33 By Mirko Zorz The role of the CISO has evolved into a critical position that encompasses many responsibilities aimed at safeguarding digital assets, preserving data integrity, and mitigating cyber threats. In essence, the role of the CISO is a complex and ever-evolving one that demands

React to this headline:

Loading spinner

How CISOs break down complex security challenges Read More »

Balancing telecom security, law enforcement, and customer trust

Balancing telecom security, law enforcement, and customer trust 15/08/2023 at 07:48 By Mirko Zorz In this Help Net Security interview, Mark O’Neill, CTO at BlackDice Cyber, talks about collaboration, transparent policies, and a security-first mindset. As 5G and IoT emerge, robust measures and AI will navigate challenges and shape the telecom industry’s future. Considering the

React to this headline:

Loading spinner

Balancing telecom security, law enforcement, and customer trust Read More »

Deception technology and breach anticipation strategies

Deception technology and breach anticipation strategies 14/08/2023 at 08:02 By Mirko Zorz Cybersecurity is undergoing a paradigm shift. Previously, defenses were built on the assumption of keeping adversaries out; now, strategies are formed with the idea that they might already be within the network. This modern approach has given rise to advanced methods prioritizing rapid

React to this headline:

Loading spinner

Deception technology and breach anticipation strategies Read More »

How digital content security stays resilient amid evolving threats

How digital content security stays resilient amid evolving threats 11/08/2023 at 07:32 By Mirko Zorz With threats evolving and multiplying, it’s essential to understand how technological advancements can serve as both a challenge and an opportunity to safeguard digital content. In this Help Net Security interview, Rusty Cumpston, CEO at RKVST, discusses blockchain’s role in

React to this headline:

Loading spinner

How digital content security stays resilient amid evolving threats Read More »

Learning from past healthcare breaches to fortify future cybersecurity strategies

Learning from past healthcare breaches to fortify future cybersecurity strategies 10/08/2023 at 07:02 By Help Net Security In the face of rising cyber threats, the healthcare sector has become a hotbed for cyberattacks. Given the gravity of this situation, we sat down with Shenny Sheth, Deputy CISO at Centura Health, who sheds light on the

React to this headline:

Loading spinner

Learning from past healthcare breaches to fortify future cybersecurity strategies Read More »

Using creative recruitment strategies to tackle the cybersecurity skills shortage

Using creative recruitment strategies to tackle the cybersecurity skills shortage 09/08/2023 at 07:03 By Mirko Zorz With the increasing complexity of cyber threats and the global shortage of cybersecurity experts, organizations are looking for creative approaches to recruiting and retaining top talent. In this Help Net Security interview, Jon Check, Executive Director of Cybersecurity Protection

React to this headline:

Loading spinner

Using creative recruitment strategies to tackle the cybersecurity skills shortage Read More »

Scroll to Top