opinion

Bridging the risk exposure gap with strategies for internal auditors

Bridging the risk exposure gap with strategies for internal auditors 30/11/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Richard Chambers, Senior Internal Audit Advisor at AuditBoard, discusses the transformational role of the internal audit function and risk management in helping organizations bridge the gap in risk exposure. He talks about how […]

React to this headline:

Loading spinner

Bridging the risk exposure gap with strategies for internal auditors Read More »

5 resolutions to prepare for SEC’s new cyber disclosure rules

5 resolutions to prepare for SEC’s new cyber disclosure rules 29/11/2023 at 08:32 By Help Net Security 2023 has been marked as a year of global conflict and unrest, all of which will impact the cyber threat landscape for years to come. However, one of the most significant cyber security developments for 2024 isn’t driven

React to this headline:

Loading spinner

5 resolutions to prepare for SEC’s new cyber disclosure rules Read More »

Strategies for cultivating a supportive culture in zero-trust adoption

Strategies for cultivating a supportive culture in zero-trust adoption 29/11/2023 at 08:01 By Mirko Zorz In this Help Net Security interview, Wolfgang Goerlich, Advisory CISO at Cisco, discusses the benefits of implementing a mature zero-trust model for both security and business outcomes, revealing a decrease in reported security incidents and enhanced adaptability. Goerlich emphasizes the

React to this headline:

Loading spinner

Strategies for cultivating a supportive culture in zero-trust adoption Read More »

Stop panic buying your security products and start prioritizing

Stop panic buying your security products and start prioritizing 28/11/2023 at 09:02 By Help Net Security As 2024 is rounding the corner, many companies are making a fresh start with a new cybersecurity budget. But with the growing number of cyberattacks and their increasingly complex nature, even those companies whose cybersecurity budgets have gone up

React to this headline:

Loading spinner

Stop panic buying your security products and start prioritizing Read More »

How passkeys are reshaping user security and convenience

How passkeys are reshaping user security and convenience 28/11/2023 at 08:34 By Mirko Zorz In this Help Net Security interview, Anna Pobletts, Head of Passwordless at 1Password, talks about passkey adoption and its acceleration in 2024. This trend is particularly notable among highly-regulated services like fintech and banking, where users seek a sign-in experience that

React to this headline:

Loading spinner

How passkeys are reshaping user security and convenience Read More »

Why it’s the perfect time to reflect on your software update policy

Why it’s the perfect time to reflect on your software update policy 27/11/2023 at 08:04 By Help Net Security The threat landscape is evolving by the minute, with both malicious actors and well-intentioned researchers constantly on the hunt for new attack vectors that bypass security controls and gain control of systems and applications. In fact,

React to this headline:

Loading spinner

Why it’s the perfect time to reflect on your software update policy Read More »

Vulnerability disclosure: Legal risks and ethical considerations for researchers

Vulnerability disclosure: Legal risks and ethical considerations for researchers 27/11/2023 at 07:32 By Mirko Zorz In this Help Net Security interview, Eddie Zhang, Principal Consultant at Project Black, explores the complex and often controversial world of vulnerability disclosure in cybersecurity. Zhang explores the intricate balancing act that researchers must perform when navigating the interests of

React to this headline:

Loading spinner

Vulnerability disclosure: Legal risks and ethical considerations for researchers Read More »

NIS2 and its global ramifications

NIS2 and its global ramifications 24/11/2023 at 08:31 By Help Net Security The Network and Information Systems Directive (NIS2), due to come into effect in October 2024, seeks to improve cyber resilience in the European Union (EU). Its effects are likely to be wider reaching, though, bringing in more stringent processes and controls and redefining

React to this headline:

Loading spinner

NIS2 and its global ramifications Read More »

CISOs can marry security and business success

CISOs can marry security and business success 22/11/2023 at 08:33 By Help Net Security With an endless string of cyber fires to be put out, it’s easy to forget that the cybersecurity function in an organization doesn’t exist in a vacuum. Its main purpose is to ensure the organization succeeds, and that’s the reason CISOs

React to this headline:

Loading spinner

CISOs can marry security and business success Read More »

Why cyber war readiness is critical for democracies

Why cyber war readiness is critical for democracies 17/11/2023 at 14:02 By Zeljka Zorz Once the war in Ukraine ends, Russia’s offensive cyber capabilities will be directed towards other targets, Rik Ferguson, VP Security Intelligence for Forescout, predicted at IRISSCON on Thursday. Rik Ferguson on stage at IRISSCON 2023 The skills employed, the hacktivists and

React to this headline:

Loading spinner

Why cyber war readiness is critical for democracies Read More »

Crypto asset discovery and the post-quantum migration

Crypto asset discovery and the post-quantum migration 15/11/2023 at 09:33 By Help Net Security Quantum computing is reshaping our world and will revolutionize many industries, including materials science, life sciences, transportation, and energy. Google recently demonstrated the power of quantum computers by solving a problem in seconds that today’s supercomputers require nearly 50 years to

React to this headline:

Loading spinner

Crypto asset discovery and the post-quantum migration Read More »

Modeling organizations’ defensive mechanisms with MITRE D3FEND

Modeling organizations’ defensive mechanisms with MITRE D3FEND 15/11/2023 at 09:02 By Mirko Zorz Funded by the National Security Agency, MITRE’s D3FEND framework is helping to provide standardization, specificity, and repeatability needed by cybersecurity engineers. As the framework moves from the beta version to version 1.0 in 2024, we asked D3FEND creator Peter Kaloroumakis how D3FEND

React to this headline:

Loading spinner

Modeling organizations’ defensive mechanisms with MITRE D3FEND Read More »

4 warning signs that your low-code development needs DevSecOps

4 warning signs that your low-code development needs DevSecOps 14/11/2023 at 09:31 By Help Net Security Low code platforms have democratized development in the enterprise. They improve efficiency and enable companies to do more with less. But as you begin to do more you will start hitting speed bumps that eventually become roadblocks. If your

React to this headline:

Loading spinner

4 warning signs that your low-code development needs DevSecOps Read More »

Collaborative strategies are key to enhanced ICS security

Collaborative strategies are key to enhanced ICS security 14/11/2023 at 08:32 By Mirko Zorz In this Help Net Security interview, Marko Gulan, Cyber Security Consultant at Schneider Electric, discusses the complexities of safeguarding industrial control systems (ICS). Our conversation will explore the importance of cross-departmental collaboration, balancing security with system functionality, and the dynamic nature

React to this headline:

Loading spinner

Collaborative strategies are key to enhanced ICS security Read More »

Cyber risk is business risk: Qualys Enterprise TruRisk Platform sets new industry standard

Cyber risk is business risk: Qualys Enterprise TruRisk Platform sets new industry standard 13/11/2023 at 10:33 By Help Net Security In this Help Net Security interview, Sumedh Thakar, President and CEO of Qualys explores the vision behind the Qualys Enterprise TruRisk Platform, a strategic move aimed at redefining how enterprises measure, communicate, and eliminate cyber

React to this headline:

Loading spinner

Cyber risk is business risk: Qualys Enterprise TruRisk Platform sets new industry standard Read More »

Success eludes the International Counter Ransomware Initiative

Success eludes the International Counter Ransomware Initiative 13/11/2023 at 09:46 By Help Net Security A swing and a miss by the 50 member countries of the International Counter Ransomware Initiative (CRI), headlined by the US, who have confirmed a commitment to collectively address ransomware. Ransomware, as predicted, is growing at tremendous rates and focusing on

React to this headline:

Loading spinner

Success eludes the International Counter Ransomware Initiative Read More »

The real cost of healthcare cybersecurity breaches

The real cost of healthcare cybersecurity breaches 13/11/2023 at 09:33 By Mirko Zorz With each step towards digitalization, from cloud computing to electronic records, the healthcare sector faces mounting risks that threaten not just the privacy but the very wellbeing of patients. In this Help Net Security interview, Taylor Lehmann, Director, Office of the CISO,

React to this headline:

Loading spinner

The real cost of healthcare cybersecurity breaches Read More »

How to withstand the onslaught of cybersecurity threats

How to withstand the onslaught of cybersecurity threats 10/11/2023 at 08:31 By Help Net Security “We brought a shovel to fight an avalanche.” That’s the sentiment shared by many business leaders, especially CISOs, CIOs and IT leaders as they face the current cybersecurity threat landscape. Like an avalanche, it’s constantly shifting and changing, moving quickly

React to this headline:

Loading spinner

How to withstand the onslaught of cybersecurity threats Read More »

Security in the impending age of quantum computers

Security in the impending age of quantum computers 09/11/2023 at 09:02 By Help Net Security Quantum computing is poised to be one of the most important technologies of the 21st century. With global governments having collectively pledged more than $38 billion in public funds for quantum technologies and $2.1 billion of new private capital flowing

React to this headline:

Loading spinner

Security in the impending age of quantum computers Read More »

The 3 key stages of ransomware attacks and useful indicators of compromise

The 3 key stages of ransomware attacks and useful indicators of compromise 08/11/2023 at 09:02 By Help Net Security For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary ransomware attack stages. In this article, we

React to this headline:

Loading spinner

The 3 key stages of ransomware attacks and useful indicators of compromise Read More »

Scroll to Top