Features

Investing in Privacy by Design for long-term compliance

Investing in Privacy by Design for long-term compliance 2024-10-10 at 07:31 By Mirko Zorz In this Help Net Security interview, Bojan Belušić, Head of Information Security & IT Operations at Microblink, discusses the relationship between Privacy by Design and regulatory frameworks like GDPR. Integrating privacy principles from the outset of product and process development ensures […]

React to this headline:

Loading spinner

Investing in Privacy by Design for long-term compliance Read More »

Balancing legal frameworks and enterprise security governance

Balancing legal frameworks and enterprise security governance 2024-10-10 at 07:01 By Mirko Zorz In this Help Net Security interview, Tom McAndrew, CEO at Coalfire, discusses the balance organizations must strike between legal compliance and effective enterprise security governance in the context of evolving regulatory frameworks. McAndrew also addresses the need for clear governance structures and

React to this headline:

Loading spinner

Balancing legal frameworks and enterprise security governance Read More »

Cultivating a security-first mindset: Key leadership actions

Cultivating a security-first mindset: Key leadership actions 2024-10-09 at 07:31 By Mirko Zorz In this Help Net Security interview, Emily Wienhold, Cyber Education Specialist at Optiv, discusses how business leaders can promote a security-first culture within their organizations. Wienhold also discusses strategies for maintaining ongoing cybersecurity awareness and making security protocols accessible to non-technical staff.

React to this headline:

Loading spinner

Cultivating a security-first mindset: Key leadership actions Read More »

How hybrid workforces are reshaping authentication strategies

How hybrid workforces are reshaping authentication strategies 2024-10-08 at 07:01 By Mirko Zorz In this Help Net Security interview, Brian Pontarelli, CEO at FusionAuth, discusses the evolving authentication challenges posed by the rise of hybrid and remote workforces. He advocates for zero trust strategies, including MFA and behavioral biometrics, to enhance security while maintaining productivity.

React to this headline:

Loading spinner

How hybrid workforces are reshaping authentication strategies Read More »

Transforming cloud security with real-time visibility

Transforming cloud security with real-time visibility 2024-10-07 at 07:31 By Mirko Zorz In this Help Net Security interview, Amiram Shachar, CEO at Upwind, discusses the complexities of cloud security in hybrid and multi-cloud environments. He outlines the need for deep visibility into configurations and real-time insights to achieve a balance between agility and security. Shachar

React to this headline:

Loading spinner

Transforming cloud security with real-time visibility Read More »

Best practices for implementing threat exposure management, reducing cyber risk exposure

Best practices for implementing threat exposure management, reducing cyber risk exposure 2024-10-04 at 07:16 By Mirko Zorz In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising from expanded attack surfaces

React to this headline:

Loading spinner

Best practices for implementing threat exposure management, reducing cyber risk exposure Read More »

Spotting AI-generated scams: Red flags to watch for

Spotting AI-generated scams: Red flags to watch for 2024-10-03 at 07:32 By Mirko Zorz In this Help Net Security interview, Andrius Popovas, Chief Risk Officer at Mano Bank, discusses the most prevalent AI-driven fraud schemes, such as phishing attacks and deepfakes. He explains how AI manipulates videos and audio to deceive victims and highlights key

React to this headline:

Loading spinner

Spotting AI-generated scams: Red flags to watch for Read More »

Enhancing firewall management with automation tools

Enhancing firewall management with automation tools 2024-10-02 at 08:01 By Mirko Zorz In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to effectively balance security needs with network performance. What factors should organizations prioritize when selecting a next-generation firewall to balance security

React to this headline:

Loading spinner

Enhancing firewall management with automation tools Read More »

Reducing credential complexity with identity federation

Reducing credential complexity with identity federation 2024-10-01 at 07:01 By Mirko Zorz In this Help Net Security interview, Omer Cohen, Chief Security Officer at Descope, discusses the impact of identity federation on organizational security and user experience. He explains how this approach streamlines credential management and enhances security by leveraging trusted identity providers while simplifying

React to this headline:

Loading spinner

Reducing credential complexity with identity federation Read More »

Businesses turn to private AI for enhanced security and data management

Businesses turn to private AI for enhanced security and data management 2024-09-30 at 06:31 By Mirko Zorz In this Help Net Security interview, Joe Baguley, CTO EMEA at Broadcom, shares insights on private AI and its significance in data security. He explains how it helps organizations maintain control over sensitive information while addressing the complexities

React to this headline:

Loading spinner

Businesses turn to private AI for enhanced security and data management Read More »

Developing an effective cyberwarfare response plan

Developing an effective cyberwarfare response plan 2024-09-27 at 07:01 By Mirko Zorz In this Help Net Security interview, Nadir Izrael, CTO at Armis, discusses how AI has transformed cyberwarfare by amplifying attacks’ scale and sophistication. Izrael emphasizes the need for AI-powered defenses and proactive cybersecurity strategies to combat these evolving threats. How has adopting AI

React to this headline:

Loading spinner

Developing an effective cyberwarfare response plan Read More »

Compliance management strategies for protecting data in complex regulatory environments

Compliance management strategies for protecting data in complex regulatory environments 2024-09-26 at 07:02 By Mirko Zorz In this Help Net Security interview, Andrius Buinovskis, Head of Product at NordLayer, discusses how organizations can assess their compliance management and ensure they meet regulatory requirements. Buinovskis also addresses the challenges of managing multiple frameworks and offers strategies

React to this headline:

Loading spinner

Compliance management strategies for protecting data in complex regulatory environments Read More »

Securing non-human identities: Why fragmented strategies fail

Securing non-human identities: Why fragmented strategies fail 2024-09-25 at 07:31 By Mirko Zorz In this Help Net Security interview, John Yeoh, Global VP of Research at CSA, discusses the growing security challenges posed by non-human identities (NHIs). With NHIs now outnumbering human identities by 20 to 1, organizations are struggling to secure these digital entities

React to this headline:

Loading spinner

Securing non-human identities: Why fragmented strategies fail Read More »

Future-proofing cybersecurity: Why talent development is key

Future-proofing cybersecurity: Why talent development is key 2024-09-24 at 08:01 By Mirko Zorz In this Help Net Security interview, Jon France, CISO at ISC2, discusses cybersecurity workforce growth. He outlines organizations’ challenges, such as budget constraints and limited entry-level opportunities. France also points to the urgent need to upskill current employees and adopt inclusive hiring

React to this headline:

Loading spinner

Future-proofing cybersecurity: Why talent development is key Read More »

Offensive cyber operations are more than just attacks

Offensive cyber operations are more than just attacks 2024-09-23 at 07:01 By Mirko Zorz In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities surrounding offensive cyber operations. Many myths stem from a simplistic view of these operations, ranging from direct

React to this headline:

Loading spinner

Offensive cyber operations are more than just attacks Read More »

Striking the balance between cybersecurity and operational efficiency

Striking the balance between cybersecurity and operational efficiency 2024-09-20 at 07:31 By Mirko Zorz In this Help, Net Security interview, Michael Oberlaender, ex-CISO, and book author, discusses how to strike the right balance between security and operational efficiency. Oberlaender advises companies starting their cybersecurity journey and stresses the importance of aligning with various frameworks. He

React to this headline:

Loading spinner

Striking the balance between cybersecurity and operational efficiency Read More »

Essential metrics for effective security program assessment

Essential metrics for effective security program assessment 2024-09-19 at 07:02 By Mirko Zorz In this Help Net Security interview, Alex Spivakovsky, VP of Research & Cybersecurity at Pentera, discusses essential metrics for evaluating the success of security programs. Spivakovsky explains how automation and proactive testing can reveal vulnerabilities and improve overall security posture. What are

React to this headline:

Loading spinner

Essential metrics for effective security program assessment Read More »

Detecting vulnerable code in software dependencies is more complex than it seems

Detecting vulnerable code in software dependencies is more complex than it seems 2024-09-18 at 07:31 By Mirko Zorz In this Help Net Security interview, Henrik Plate, CISSP, security researcher, Endor Labs, discusses the complexities AppSec teams face in identifying vulnerabilities within software dependencies. Plate also discusses the limitations of traditional software composition analysis (SCA) solutions

React to this headline:

Loading spinner

Detecting vulnerable code in software dependencies is more complex than it seems Read More »

The growing danger of visual hacking and how to protect against it

The growing danger of visual hacking and how to protect against it 2024-09-17 at 07:01 By Mirko Zorz In this Help Net Security interview, Robert Ramsey, CEO at Rain Technology, discusses the growing threat of visual hacking, how it bypasses traditional cybersecurity measures, and the importance of physical barriers like switchable privacy screens. Could you

React to this headline:

Loading spinner

The growing danger of visual hacking and how to protect against it Read More »

Compliance frameworks and GenAI: The Wild West of security standards

Compliance frameworks and GenAI: The Wild West of security standards 2024-09-16 at 07:01 By Mirko Zorz In this Help Net Security interview, Kristian Kamber, CEO at SplxAI, discusses how security challenges for GenAI differ from traditional software. Unlike predictable software, GenAI introduces dynamic, evolving threats, requiring new strategies for defense and compliance. Kamber highlights the

React to this headline:

Loading spinner

Compliance frameworks and GenAI: The Wild West of security standards Read More »

Scroll to Top