opinion

March 2025 Patch Tuesday forecast: A return to normalcy

March 2025 Patch Tuesday forecast: A return to normalcy 2025-03-10 at 08:33 By Help Net Security The February Patch Tuesday updates and activity during the month marked a return to normalcy for patch management. Following the January updates addressing 100+ vulnerabilities, we saw 37 CVEs fixed in Windows 11 and 33 CVEs in Windows 10. […]

React to this headline:

Loading spinner

March 2025 Patch Tuesday forecast: A return to normalcy Read More »

The 5 stages of incident response grief

The 5 stages of incident response grief 2025-03-05 at 18:03 By Help Net Security Whether we recognize it or not, anytime an incident occurs, it sets off the grieving process. But grief isn’t a bad thing: it’s how we process our emotional reactions and move on. That’s precisely what security teams need to do in

React to this headline:

Loading spinner

The 5 stages of incident response grief Read More »

Prioritizing data and identity security in 2025

Prioritizing data and identity security in 2025 2025-03-04 at 17:02 By Help Net Security To say that the cybersecurity landscape has grown more complex over the past several years would be a dramatic understatement. Attackers have more resources at their fingertips than ever, and data breaches have become almost a daily occurrence. For both businesses

React to this headline:

Loading spinner

Prioritizing data and identity security in 2025 Read More »

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation 2025-03-04 at 09:23 By Mirko Zorz In this Help Net Security interview, Matthew Darlage, CISO at Citizens, discusses key strategies for strengthening cyber resilience in banks. He underlines that adherence to frameworks like NIST is essential for continuous improvement and that data protection

React to this headline:

Loading spinner

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation Read More »

CISO vs. CIO: Where security and IT leadership clash (and how to fix it)

CISO vs. CIO: Where security and IT leadership clash (and how to fix it) 2025-03-04 at 08:01 By Mirko Zorz The dynamic between CISOs and CIOs has always been complex. While both roles are essential to an organization’s success, their priorities often put them at odds. The CIO focuses on IT efficiency, innovation, and business

React to this headline:

Loading spinner

CISO vs. CIO: Where security and IT leadership clash (and how to fix it) Read More »

Understanding the AI Act and its compliance challenges

Understanding the AI Act and its compliance challenges 2025-02-28 at 08:03 By Mirko Zorz In this Help Net Security interview, David Dumont, Partner at Hunton Andrews Kurth, discusses the implications of the EU AI Act and how organizations can leverage existing GDPR frameworks while addressing new obligations such as conformity assessments and transparency requirements. Dumont

React to this headline:

Loading spinner

Understanding the AI Act and its compliance challenges Read More »

Debunking 5 myths about network automation

Debunking 5 myths about network automation 2025-02-27 at 06:02 By Help Net Security Imagine you’re a network engineer at an enterprise. You already have your hands full with IT priorities, including managing bandwidth related to working from home, the company’s new data center, and, more recently, computing needs to support AI adoption. Additionally, the security

React to this headline:

Loading spinner

Debunking 5 myths about network automation Read More »

Cybersecurity needs a leader, so let’s stop debating and start deciding

Cybersecurity needs a leader, so let’s stop debating and start deciding 2025-02-25 at 18:09 By Help Net Security Have you ever heard anyone earnestly ask in a business, “Who owns legal?” or “Who sets the financial strategy?” Probably not – it should be obvious, right? Yet, when it comes to cybersecurity, the question of ownership

React to this headline:

Loading spinner

Cybersecurity needs a leader, so let’s stop debating and start deciding Read More »

Avoiding vendor lock-in when using managed cloud security services

Avoiding vendor lock-in when using managed cloud security services 2025-02-25 at 08:05 By Mirko Zorz In this Help Net Security interview, Marina Segal, CEO at Tamnoon, discusses the most significant obstacles when implementing managed cloud security in hybrid and multi-cloud environments. She shares insights on long onboarding times, legacy security gaps, vendor lock-in, and overlooked

React to this headline:

Loading spinner

Avoiding vendor lock-in when using managed cloud security services Read More »

Man vs. machine: Striking the perfect balance in threat intelligence

Man vs. machine: Striking the perfect balance in threat intelligence 2025-02-24 at 08:00 By Mirko Zorz In this Help Net Security interview, Aaron Roberts, Director at Perspective Intelligence, discusses how automation is reshaping threat intelligence. He explains that while AI tools can process massive data sets, the nuanced judgment of experienced analysts remains critical. Roberts

React to this headline:

Loading spinner

Man vs. machine: Striking the perfect balance in threat intelligence Read More »

Mastering the cybersecurity tightrope of protection, detection, and response

Mastering the cybersecurity tightrope of protection, detection, and response 2025-02-21 at 08:05 By Mirko Zorz In this Help Net Security interview, Chester Wisniewski, Director and Global Field CISO at Sophos, discusses the shifting ransomware landscape, the risks posed by quantum decryption threats, and the role of vendor security validation. Wisniewski notes that cyber resilience is

React to this headline:

Loading spinner

Mastering the cybersecurity tightrope of protection, detection, and response Read More »

Unknown and unsecured: The risks of poor asset visibility

Unknown and unsecured: The risks of poor asset visibility 2025-02-20 at 07:34 By Mirko Zorz In this Help Net Security interview, Juliette Hudson, CTO of CybaVerse, discusses why asset visibility remains a critical cybersecurity challenge. She explains how to maintain security without slowing down operations, shares ways to improve visibility in OT environments, and explains

React to this headline:

Loading spinner

Unknown and unsecured: The risks of poor asset visibility Read More »

6 considerations for 2025 cybersecurity investment decisions

6 considerations for 2025 cybersecurity investment decisions 2025-02-18 at 18:33 By Help Net Security Cybersecurity professionals may be concerned about the constantly shifting threat landscape. From the increased use of artificial intelligence (AI) by malicious actors to the expanding attack surface, cybersecurity risks evolve, and defenders need to mitigate them. Despite a period of cybersecurity

React to this headline:

Loading spinner

6 considerations for 2025 cybersecurity investment decisions Read More »

The risks of autonomous AI in machine-to-machine interactions

The risks of autonomous AI in machine-to-machine interactions 2025-02-18 at 08:03 By Mirko Zorz In this Help Net Security, Oded Hareven, CEO of Akeyless Security, discusses how enterprises should adapt their cybersecurity strategies to address the growing need for machine-to-machine (M2M) security. According to Hareven, machine identities must be secured and governed similarly to human

React to this headline:

Loading spinner

The risks of autonomous AI in machine-to-machine interactions Read More »

How CISOs can balance security and business agility in the cloud

How CISOs can balance security and business agility in the cloud 2025-02-17 at 08:03 By Mirko Zorz In this Help Net Security interview, Natalia Belaya, CISO at Cloudera, discusses common misconceptions about cloud security, the balance between protection and business agility, and overlooked risks that CISOs should prioritize. Belaya also offers practical strategies for integrating

React to this headline:

Loading spinner

How CISOs can balance security and business agility in the cloud Read More »

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance 2025-02-13 at 07:30 By Help Net Security The United Kingdom government has secretly requested that Apple build a backdoor into its iCloud service, granting the government unrestricted access to users’ private data. This revelation deeply concerns me – it is a blatant

React to this headline:

Loading spinner

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance Read More »

It’s time to secure the extended digital supply chain

It’s time to secure the extended digital supply chain 2025-02-12 at 07:35 By Help Net Security Organizations’ increasing reliance on third-party software and services has created an environment with more vulnerabilities and harder-to-detect risks. Attackers know they can increase efficiency and profitability by compromising the supply chain and are focusing their efforts accordingly. The commoditization

React to this headline:

Loading spinner

It’s time to secure the extended digital supply chain Read More »

Arvest Bank CISO on building a strong cybersecurity culture in banking

Arvest Bank CISO on building a strong cybersecurity culture in banking 2025-02-11 at 07:31 By Mirko Zorz In this Help Net Security interview, Mike Calvi, CISO at Arvest Bank, discusses building a strong cybersecurity culture within the banking sector. He explains how leadership, effective reporting, and proactive engagement with associates are key in strengthening security.

React to this headline:

Loading spinner

Arvest Bank CISO on building a strong cybersecurity culture in banking Read More »

Security validation: The new standard for cyber resilience

Security validation: The new standard for cyber resilience 2025-02-10 at 07:37 By Help Net Security Security validation has officially turned a corner. Once considered a “nice-to-have” it’s now a top priority for security leaders worldwide. This shift has been accelerated by frameworks like Gartner’s Continuous Threat Exposure Management (CTEM), introduced in 2022, which emphasizes the

React to this headline:

Loading spinner

Security validation: The new standard for cyber resilience Read More »

Political campaigns struggle to balance AI personalization and voter privacy

Political campaigns struggle to balance AI personalization and voter privacy 2025-02-10 at 07:05 By Mirko Zorz In this Help Net Security interview, Mateusz Łabuz, researcher at the IFSH, discusses the balance between using AI for personalized political campaigns and protecting voter privacy. Łabuz also discusses the potential of AI in fact-checking, the regulatory landscape, and

React to this headline:

Loading spinner

Political campaigns struggle to balance AI personalization and voter privacy Read More »

Scroll to Top