opinion

The sixth sense of cybersecurity: How AI spots threats before they strike

The sixth sense of cybersecurity: How AI spots threats before they strike 2024-12-30 at 07:47 By Mirko Zorz In this Help Net Security interview, Vineet Chaku, President of Reaktr.ai, discusses how AI is transforming cybersecurity, particularly in anomaly detection and threat identification. Chaku talks about the skills cybersecurity professionals need to collaborate with AI systems […]

React to this headline:

Loading spinner

The sixth sense of cybersecurity: How AI spots threats before they strike Read More »

The future of data and AI: Seven trends shaping 2025 and beyond

The future of data and AI: Seven trends shaping 2025 and beyond 2024-12-27 at 07:31 By Help Net Security In 2025, seven trends will shape the future of data and AI, offering advantages for those who see these changes not as challenges but as opportunities to innovate and excel. The post The future of data

React to this headline:

Loading spinner

The future of data and AI: Seven trends shaping 2025 and beyond Read More »

Overwhelmed by fraud? Here’s how financial pros fight back

Overwhelmed by fraud? Here’s how financial pros fight back 2024-12-27 at 07:04 By Mirko Zorz In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the growing threat of deepfake-related fraud and its impact on financial security. He also discusses overlooked vulnerabilities in digital banking and offers advice for organizations to

React to this headline:

Loading spinner

Overwhelmed by fraud? Here’s how financial pros fight back Read More »

2025 is going to be a bumpy year for IoT

2025 is going to be a bumpy year for IoT 2024-12-24 at 08:18 By Help Net Security In the Internet of Things (IoT) sector, 2025 is shaping up to be a politically charged year. Major global jurisdictions are set to implement device security regulations, coinciding with potential tariffs, shifting production dynamics, and rising geopolitical tensions.

React to this headline:

Loading spinner

2025 is going to be a bumpy year for IoT Read More »

How CISOs can make smarter risk decisions

How CISOs can make smarter risk decisions 2024-12-24 at 07:03 By Mirko Zorz In this Help Net Security interview, Gavin Reid, CISO at HUMAN Security, talks about the latest cybersecurity threats and how attackers are becoming more sophisticated. He explains the difficulties organizations encounter in detecting fraud and malicious bots while keeping the user experience

React to this headline:

Loading spinner

How CISOs can make smarter risk decisions Read More »

Maximizing the impact of cybercrime intelligence on business resilience

Maximizing the impact of cybercrime intelligence on business resilience 2024-12-23 at 07:16 By Mirko Zorz In this Help Net Security interview, Jason Passwaters, CEO of Intel 471, discusses how integrating cybercrime intelligence into an organization’s security strategy enables proactive threat management and how measuring intelligence efforts can help mitigate risks before they escalate. Passwaters also

React to this headline:

Loading spinner

Maximizing the impact of cybercrime intelligence on business resilience Read More »

Why cybersecurity is critical to energy modernization

Why cybersecurity is critical to energy modernization 2024-12-20 at 07:53 By Mirko Zorz In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresses the need for international collaboration,

React to this headline:

Loading spinner

Why cybersecurity is critical to energy modernization Read More »

Are threat feeds masking your biggest security blind spot?

Are threat feeds masking your biggest security blind spot? 2024-12-19 at 07:33 By Help Net Security Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind

React to this headline:

Loading spinner

Are threat feeds masking your biggest security blind spot? Read More »

Leadership skills for managing cybersecurity during digital transformation

Leadership skills for managing cybersecurity during digital transformation 2024-12-19 at 07:03 By Mirko Zorz In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The post Leadership skills for managing

React to this headline:

Loading spinner

Leadership skills for managing cybersecurity during digital transformation Read More »

CISO accountability: Navigating a landscape of responsibility

CISO accountability: Navigating a landscape of responsibility 2024-12-18 at 07:36 By Help Net Security What was once primarily a technical role, CISOs now find themselves accountable for organizational risk, regulatory compliance, and even legal liabilities across the entire organization. However, as cyber threats intensify, it’s clear that overseeing cybersecurity operations enterprise-wide is not feasible for

React to this headline:

Loading spinner

CISO accountability: Navigating a landscape of responsibility Read More »

Key steps to scaling automated compliance while maintaining security

Key steps to scaling automated compliance while maintaining security 2024-12-18 at 07:01 By Mirko Zorz In this Help Net Security interview, Vivek Agarwal, Privacy Program Manager at Meta Platforms, shares insights on strategies for reducing time to market, improving vendor onboarding, and updating privacy requirements to ensure compliance across third-party contracts. From leveraging automation and

React to this headline:

Loading spinner

Key steps to scaling automated compliance while maintaining security Read More »

The shifting security landscape: 2025 predictions and challenges

The shifting security landscape: 2025 predictions and challenges 2024-12-17 at 07:33 By Help Net Security As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s plan calls for integrated cyber defense across borders, addressing the complex, global cybersecurity challenges that businesses, governments

React to this headline:

Loading spinner

The shifting security landscape: 2025 predictions and challenges Read More »

With DORA approaching, financial institutions must strengthen their cyber resilience

With DORA approaching, financial institutions must strengthen their cyber resilience 2024-12-16 at 07:33 By Help Net Security The clock is ticking for financial institutions across the EU as the January 17, 2025, deadline for the Digital Operational Resilience Act (DORA) approaches. This regulation will reshape how organizations in the financial sector approach cybersecurity and operational

React to this headline:

Loading spinner

With DORA approaching, financial institutions must strengthen their cyber resilience Read More »

How companies can address bias and privacy challenges in AI models

How companies can address bias and privacy challenges in AI models 2024-12-16 at 07:03 By Mirko Zorz In this Help Net Security interview, Emre Kazim, Co-CEO of Holistic AI, discusses the need for companies to integrate responsible AI practices into their business strategies from the start. He explores how addressing issues like bias, privacy, and

React to this headline:

Loading spinner

How companies can address bias and privacy challenges in AI models Read More »

Tackling software vulnerabilities with smarter developer strategies

Tackling software vulnerabilities with smarter developer strategies 2024-12-13 at 07:03 By Mirko Zorz In this Help Net Security interview, Karl Mattson, CISO at Endor Labs, discusses strategies for enhancing secure software development. Mattson covers how developers can address vulnerabilities in complex systems, ways organizations can better support secure coding practices, and the role of languages

React to this headline:

Loading spinner

Tackling software vulnerabilities with smarter developer strategies Read More »

We must adjust expectations for the CISO role

We must adjust expectations for the CISO role 2024-12-12 at 11:52 By Help Net Security Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information security officer (CISO) role, once a back-office function primarily focused on technical oversight, has moved squarely into the executive spotlight.

React to this headline:

Loading spinner

We must adjust expectations for the CISO role Read More »

Shaping effective AI governance is about balancing innovation with humanity

Shaping effective AI governance is about balancing innovation with humanity 2024-12-12 at 07:04 By Mirko Zorz In this Help Net Security interview, Ben de Bont, CISO at ServiceNow, discusses AI governance, focusing on how to foster innovation while ensuring responsible oversight. He emphasizes the need for collaboration between technologists, policymakers, and ethicists to create ethical

React to this headline:

Loading spinner

Shaping effective AI governance is about balancing innovation with humanity Read More »

Why crisis simulations fail and how to fix them

Why crisis simulations fail and how to fix them 2024-12-11 at 07:03 By Mirko Zorz In this Help Net Security interview, Allison Ritter, Head of Cyber Experiential Exercising at Cyberbit, shares her insights on the key differences between in-person and virtual cyber crisis simulations and what makes each approach effective. Ritter highlights the need for

React to this headline:

Loading spinner

Why crisis simulations fail and how to fix them Read More »

Preventing data leakage in low-node/no-code environments

Preventing data leakage in low-node/no-code environments 2024-12-10 at 07:34 By Help Net Security Low-code/no-code (LCNC) platforms enable application development by citizen developers, often generating “shadow engineering” projects that evade security oversight. While LCNC solutions like Power BI reports and automated workflows foster agility and innovation, they also introduce significant risks, including data leakage. Data leakage

React to this headline:

Loading spinner

Preventing data leakage in low-node/no-code environments Read More »

Scroll to Top