Refresh

This website securityticks.com/category/opinion/ is currently offline. Cloudflare's Always Online™ shows a snapshot of this web page from the Internet Archive's Wayback Machine. To check for the live version, click Refresh.

opinion

CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0

CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0 2024-06-25 at 06:31 By Mirko Zorz In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features, significant advantages, and innovative technologies behind Qualys CyberSecurity Asset Management 3.0. Can you explain the key features of Qualys CyberSecurity Asset …

CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0 Read More »

React to this headline:

Loading spinner

Why are threat actors faking data breaches?

Why are threat actors faking data breaches? 2024-06-24 at 07:16 By Help Net Security Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European car rental company immediately launched an investigation, only to discover that the data being sold was completely doctored, possibly using generative …

Why are threat actors faking data breaches? Read More »

React to this headline:

Loading spinner

From passwords to passkeys: Enhancing security and user satisfaction

From passwords to passkeys: Enhancing security and user satisfaction 2024-06-20 at 07:01 By Mirko Zorz In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and improves user experience by simplifying the login process. Lamb also addresses the technical challenges and economic implications of …

From passwords to passkeys: Enhancing security and user satisfaction Read More »

React to this headline:

Loading spinner

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams 2024-06-18 at 08:01 By Help Net Security Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like Google Maps revolutionized navigation, process mapping can revolutionize how you understand and manage your security …

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams Read More »

React to this headline:

Loading spinner

Enhancing security through collaboration with the open-source community

Enhancing security through collaboration with the open-source community 2024-06-18 at 07:32 By Mirko Zorz In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the potential risks and benefits of collaborating with the open-source community to enhance software security. …

Enhancing security through collaboration with the open-source community Read More »

React to this headline:

Loading spinner

Low code, high stakes: Addressing SQL injection

Low code, high stakes: Addressing SQL injection 2024-06-17 at 08:01 By Help Net Security Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s. Due to various factors, they remain the third most common source of web application vulnerabilities. Reasons include human error, new technologies …

Low code, high stakes: Addressing SQL injection Read More »

React to this headline:

Loading spinner

The rise of SaaS security teams

The rise of SaaS security teams 2024-06-17 at 07:31 By Mirko Zorz In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge in organizations establishing dedicated SaaS security teams is driven by significant data breaches involving widely used platforms. What motivated the recent surge in …

The rise of SaaS security teams Read More »

React to this headline:

Loading spinner

Modern fraud detection need not rely on PII

Modern fraud detection need not rely on PII 2024-06-14 at 07:32 By Help Net Security Trends in online fraud detection often act as the canary in the coal mine when it comes to understanding and combating the next generation of online scams, fraud and cybersecurity threats. These days, security and fraud experts worry that insufficient …

Modern fraud detection need not rely on PII Read More »

React to this headline:

Loading spinner

Urgently needed: AI governance in cyber warfare

Urgently needed: AI governance in cyber warfare 2024-06-13 at 12:31 By Help Net Security Artificial intelligence is quickly becoming central to societal growth. AI has great power to improve daily life, from education to healthcare, from sustainability to defense. AI also brings to the forefront a number of risks that cut across the core values …

Urgently needed: AI governance in cyber warfare Read More »

React to this headline:

Loading spinner

How businesses can integrate token technology into existing payment systems

How businesses can integrate token technology into existing payment systems 2024-06-13 at 07:02 By Mirko Zorz In this Help Net Security interview, Mark Nelsen, SVP and Global Head of Consumer Product at Visa, discusses the integration of token technology into existing payment systems. How do businesses integrate tokenization into their existing payment systems, and what …

How businesses can integrate token technology into existing payment systems Read More »

React to this headline:

Loading spinner

Open-source security in AI

Open-source security in AI 2024-06-12 at 07:31 By Help Net Security New AI products are coming onto the market faster than we have seen in any previous technology revolution. Companies’ free access and right to use open source in AI software models has allowed them to prototype an AI product to market cheaper than ever …

Open-source security in AI Read More »

React to this headline:

Loading spinner

Security and privacy strategies for CISOs in a mobile-first world

Security and privacy strategies for CISOs in a mobile-first world 2024-06-12 at 07:01 By Mirko Zorz In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must shift their approach to data security, acknowledging the complexities introduced by mobile access to …

Security and privacy strategies for CISOs in a mobile-first world Read More »

React to this headline:

Loading spinner

Cloud migration expands the CISO role yet again

Cloud migration expands the CISO role yet again 2024-06-11 at 07:31 By Help Net Security The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud environments, the responsibilities and challenges for …

Cloud migration expands the CISO role yet again Read More »

React to this headline:

Loading spinner

AI’s role in accelerating vulnerability management

AI’s role in accelerating vulnerability management 2024-06-10 at 08:01 By Help Net Security With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In the field of vulnerability management specifically, AI is poised to have a profound impact, enhancing two key areas: Providing quicker analysis and …

AI’s role in accelerating vulnerability management Read More »

React to this headline:

Loading spinner

June 2024 Patch Tuesday forecast: Multiple announcements from Microsoft

June 2024 Patch Tuesday forecast: Multiple announcements from Microsoft 2024-06-07 at 08:16 By Help Net Security May 2024 Patch Tuesday was unusual because we had security updates from Adobe, Apple, Google, Mozilla, and Microsoft on the same day. While individually from each vendor, the updates weren’t that large, managing them together was more challenging. On …

June 2024 Patch Tuesday forecast: Multiple announcements from Microsoft Read More »

React to this headline:

Loading spinner

No summer break for cybercrime: Why educational institutions need better cyber resilience

No summer break for cybercrime: Why educational institutions need better cyber resilience 2024-06-05 at 07:31 By Help Net Security The education system isn’t equipped to handle today’s cyberthreats. I’m not just talking about cybersecurity education in schools shaping the technical workforce of the future – America’s schools themselves are prime targets for cybercrime today. In …

No summer break for cybercrime: Why educational institutions need better cyber resilience Read More »

React to this headline:

Loading spinner

How AI-powered attacks are accelerating the shift to zero trust strategies

How AI-powered attacks are accelerating the shift to zero trust strategies 2024-06-05 at 07:01 By Mirko Zorz In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats. Markey discusses the impact of emerging threats like AI-generated …

How AI-powered attacks are accelerating the shift to zero trust strategies Read More »

React to this headline:

Loading spinner

Avoiding the cybersecurity blame game

Avoiding the cybersecurity blame game 2024-05-29 at 07:31 By Help Net Security Cyber risk management has many components. Those who do it well will conduct comprehensive risk assessments, enact well-documented and well-communicated processes and controls, and fully implemented monitoring and review requirements. Processes and controls typically comprise policies, which will include detailed explanations of the …

Avoiding the cybersecurity blame game Read More »

React to this headline:

Loading spinner

The evolution of security metrics for NIST CSF 2.0

The evolution of security metrics for NIST CSF 2.0 2024-05-28 at 08:03 By Help Net Security CISOs have long been spreadsheet aficionados, soaking up metrics and using them as KPIs for security progress. These metrics have traditionally measured specific systems or single indicators — vulnerabilities detected, percentage of vulnerabilities patched, software and hardware asset inventory …

The evolution of security metrics for NIST CSF 2.0 Read More »

React to this headline:

Loading spinner

How to combat alert fatigue in cybersecurity

How to combat alert fatigue in cybersecurity 2024-05-28 at 07:31 By Mirko Zorz In this Help Net Security interview, Ken Gramley, CEO at Stamus Networks, discusses the primary causes of alert fatigue in cybersecurity and DevOps environments. Alert fatigue results from the overwhelming volume of event data generated by security tools, the prevalence of false …

How to combat alert fatigue in cybersecurity Read More »

React to this headline:

Loading spinner
Scroll to Top