Features

The blueprint for a highly effective EASM solution

The blueprint for a highly effective EASM solution 11/09/2023 at 08:04 By Mirko Zorz In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should possess, and how it deals with uncovering hidden […]

React to this headline:

Loading spinner

The blueprint for a highly effective EASM solution Read More »

LibreOffice: Stability, security, and continued development

LibreOffice: Stability, security, and continued development 07/09/2023 at 08:31 By Zeljka Zorz LibreOffice, the most widely used open-source office productivity suite, has plenty to recommend it: it’s feature-rich, user-friendly, well-documented, reliable, has an active community of developers working on improving it, and it’s free. The suite includes Writer (word processor), Calc (a spreadsheet app), Impress

React to this headline:

Loading spinner

LibreOffice: Stability, security, and continued development Read More »

Shifting left and right, innovating product security

Shifting left and right, innovating product security 07/09/2023 at 07:03 By Mirko Zorz In this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, fostering collaboration across business units and product lines, ensuring transparency and security in the supply chain, and meeting regulatory requirements

React to this headline:

Loading spinner

Shifting left and right, innovating product security Read More »

NFT collapse and monster egos feature in new Murakami exhibition

NFT collapse and monster egos feature in new Murakami exhibition 06/09/2023 at 17:01 By Cointelegraph By Tim Brinkhof Famed Japanese artist Takashi Murakami’s new exhibition comments on digital ego and the shaky status of the NFT industry. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

NFT collapse and monster egos feature in new Murakami exhibition Read More »

The misconceptions preventing wider adoption of digital signatures

The misconceptions preventing wider adoption of digital signatures 05/09/2023 at 07:33 By Mirko Zorz In this Help Net Security interview, Thorsten Hau, CEO at fidentity, discusses the legal validity of qualified digital signatures, demonstrating their equivalence to handwritten signatures when backed by robust identity verification. Opting for certified providers that adhere to standards like eIDAS

React to this headline:

Loading spinner

The misconceptions preventing wider adoption of digital signatures Read More »

What does optimal software security analysis look like?

What does optimal software security analysis look like? 31/08/2023 at 07:01 By Mirko Zorz In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools for software security. He explains how these tools can complement human knowledge to enhance software security analysis and emphasizes the need

React to this headline:

Loading spinner

What does optimal software security analysis look like? Read More »

How to protect your crypto in a volatile market: Bitcoin OGs and experts weigh in

How to protect your crypto in a volatile market: Bitcoin OGs and experts weigh in 30/08/2023 at 17:02 By Cointelegraph By Jillian Godsil Crypto OGs Brock Pierce and Tim Draper and other experts provide essential advice on how to protect your hard-earned stack. This article is an excerpt from Cointelegraph.com News View Original Source React

React to this headline:

Loading spinner

How to protect your crypto in a volatile market: Bitcoin OGs and experts weigh in Read More »

What makes a good ASM solution stand out

What makes a good ASM solution stand out 29/08/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that organizations should redefine their attack surface concept and discusses proactive measures they can take to strengthen their

React to this headline:

Loading spinner

What makes a good ASM solution stand out Read More »

Adapting authentication to a cloud-centric landscape

Adapting authentication to a cloud-centric landscape 28/08/2023 at 07:33 By Mirko Zorz In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote workforces, the negative consequences of ineffective authorization, and how the shift toward cloud transformation affects authentication strategies. What are

React to this headline:

Loading spinner

Adapting authentication to a cloud-centric landscape Read More »

IEEE 802.11az provides security enhancements, solves longstanding problems

IEEE 802.11az provides security enhancements, solves longstanding problems 25/08/2023 at 07:04 By Mirko Zorz In this Help Net Security interview, Jonathan Segev, IEEE 802.11 Task Group (TG) Chair of next-generation positioning (TGaz) at IEEE, discusses IEEE 802.11az. The new standard will enable accuracy to less than 0.1 meters, which is a significant improvement from the

React to this headline:

Loading spinner

IEEE 802.11az provides security enhancements, solves longstanding problems Read More »

AI and the evolution of surveillance systems

AI and the evolution of surveillance systems 24/08/2023 at 07:01 By Mirko Zorz In this Help Net Security interview, Gerwin van der Lugt, CTO at Oddity, discusses the future of surveillance and AI’s influence. He also delves into how organizations can prevent their systems from perpetuating biases or violating individual rights. What precautions are in

React to this headline:

Loading spinner

AI and the evolution of surveillance systems Read More »

Recursive inscriptions: Bitcoin ‘supercomputer’ and BTC DeFi coming soon

Recursive inscriptions: Bitcoin ‘supercomputer’ and BTC DeFi coming soon 23/08/2023 at 16:47 By Cointelegraph By Max Parasol Recursive inscription proponents claim the tech can bring DeFi to Bitcoin, create an on-chain AWS competitor — and even a BTC “supercomputer.“ This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Recursive inscriptions: Bitcoin ‘supercomputer’ and BTC DeFi coming soon Read More »

Anticipating the next wave of IoT cybersecurity challenges

Anticipating the next wave of IoT cybersecurity challenges 23/08/2023 at 07:01 By Mirko Zorz In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected environments, examining the broadening attack surface and the nuanced complexities this evolution imposes. Atoui also delves

React to this headline:

Loading spinner

Anticipating the next wave of IoT cybersecurity challenges Read More »

Maintaining consistent security in diverse cloud infrastructures

Maintaining consistent security in diverse cloud infrastructures 22/08/2023 at 07:01 By Mirko Zorz As cloud infrastructures become increasingly API-driven and dynamically spread across expansive attack surfaces, achieving clarity proves difficult. Compounding this challenge is the integration of DevOps practices, microservices, and container technologies, which, while fostering agility and scalability, introduce additional layers of complexity and

React to this headline:

Loading spinner

Maintaining consistent security in diverse cloud infrastructures Read More »

8 open-source OSINT tools you should try

8 open-source OSINT tools you should try 22/08/2023 at 06:01 By Help Net Security Open-Source Intelligence (OSINT) refers to gathering, assessing, and interpreting public information to address specific intelligence queries. All the tools listed here are available for free. Amass The OWASP Amass project performs network mapping of attack surfaces and external asset discovery using

React to this headline:

Loading spinner

8 open-source OSINT tools you should try Read More »

Network detection and response in the modern era

Network detection and response in the modern era 21/08/2023 at 07:04 By Mirko Zorz In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learning algorithms to

React to this headline:

Loading spinner

Network detection and response in the modern era Read More »

Reinventing OT security for dynamic landscapes

Reinventing OT security for dynamic landscapes 18/08/2023 at 07:05 By Mirko Zorz From understanding the challenges of disparate OT protocols and the increasing convergence with IT to grappling with the monumental role of human error, our latest interview with Rohit Bohara, CTO at asvin, delves deep into the landscape of OT security. As cloud solutions

React to this headline:

Loading spinner

Reinventing OT security for dynamic landscapes Read More »

The road ahead for ecommerce fraud prevention

The road ahead for ecommerce fraud prevention 17/08/2023 at 07:36 By Mirko Zorz Ecommerce platforms are incorporating sophisticated fraud detection measures, but fraudsters, too, are refining their strategies. In this Help Net Security interview, Eduardo Mônaco, CEO at ClearSale, explains the complexities of ecommerce fraud, discussing the evolution of fraudster tactics, the effectiveness of social

React to this headline:

Loading spinner

The road ahead for ecommerce fraud prevention Read More »

How CISOs break down complex security challenges

How CISOs break down complex security challenges 16/08/2023 at 07:33 By Mirko Zorz The role of the CISO has evolved into a critical position that encompasses many responsibilities aimed at safeguarding digital assets, preserving data integrity, and mitigating cyber threats. In essence, the role of the CISO is a complex and ever-evolving one that demands

React to this headline:

Loading spinner

How CISOs break down complex security challenges Read More »

Balancing telecom security, law enforcement, and customer trust

Balancing telecom security, law enforcement, and customer trust 15/08/2023 at 07:48 By Mirko Zorz In this Help Net Security interview, Mark O’Neill, CTO at BlackDice Cyber, talks about collaboration, transparent policies, and a security-first mindset. As 5G and IoT emerge, robust measures and AI will navigate challenges and shape the telecom industry’s future. Considering the

React to this headline:

Loading spinner

Balancing telecom security, law enforcement, and customer trust Read More »

Scroll to Top