opinion

Why data provenance must anchor every CISO’s AI governance strategy

Why data provenance must anchor every CISO’s AI governance strategy 2025-05-28 at 08:30 By Help Net Security Across the enterprise, artificial intelligence has crept into core functions – not through massive digital transformation programs, but through quiet, incremental adoption. Legal departments are summarizing contracts. HR is rewording sensitive employee communications. Compliance teams are experimenting with […]

React to this headline:

Loading spinner

Why data provenance must anchor every CISO’s AI governance strategy Read More »

Why app modernization can leave you less secure

Why app modernization can leave you less secure 2025-05-27 at 09:09 By Help Net Security Enterprises typically “modernize” access patterns for an application by enabling industry standard protocols like OIDC or SAML to provide single sign-on (SSO) for legacy apps via a cloud identity provider (IDP). That’s a major step towards better user experience, improved

React to this headline:

Loading spinner

Why app modernization can leave you less secure Read More »

Is privacy becoming a luxury? A candid look at consumer data use

Is privacy becoming a luxury? A candid look at consumer data use 2025-05-23 at 09:02 By Mirko Zorz In this Help Net Security interview, Dr. Joy Wu, Assistant Professor, UBC Sauder School of Business, discusses the psychological and societal impacts of data monetization, why current privacy disclosures often fall short, and what it will take

React to this headline:

Loading spinner

Is privacy becoming a luxury? A candid look at consumer data use Read More »

The hidden gaps in your asset inventory, and how to close them

The hidden gaps in your asset inventory, and how to close them 2025-05-22 at 09:06 By Mirko Zorz In this Help Net Security interview, Tim Grieveson, CSO at ThingsRecon, breaks down the first steps security teams should take to regain visibility, the most common blind spots in asset discovery, and why context should drive risk

React to this headline:

Loading spinner

The hidden gaps in your asset inventory, and how to close them Read More »

What good threat intelligence looks like in practice

What good threat intelligence looks like in practice 2025-05-21 at 08:32 By Mirko Zorz In this Help Net Security interview, Anuj Goel, CEO of Cyware, discusses how threat intelligence is no longer a nice to have, it’s a core cyber defense requirement. But turning intelligence into action remains a challenge for many organizations. The path

React to this headline:

Loading spinner

What good threat intelligence looks like in practice Read More »

Third-party cyber risks and what you can do

Third-party cyber risks and what you can do 2025-05-21 at 07:31 By Help Net Security When a third-party tech vendor suffers a cyber incident, your business can feel the effects immediately. That’s why it’s crucial to treat vendor risk as part of your cybersecurity posture. In this Help Net Security video, Mike Toole, Director of

React to this headline:

Loading spinner

Third-party cyber risks and what you can do Read More »

Containers are just processes: The illusion of namespace security

Containers are just processes: The illusion of namespace security 2025-05-20 at 08:31 By Help Net Security In the early days of commercial open source, major vendors cast doubt on its security, claiming transparency was a flaw. In fact, that openness fueled strong communities and faster security improvements, making OSS often more secure than proprietary code.

React to this headline:

Loading spinner

Containers are just processes: The illusion of namespace security Read More »

Why legal must lead on AI governance before it’s too late

Why legal must lead on AI governance before it’s too late 2025-05-20 at 08:05 By Mirko Zorz In this Help Net Security interview, Brooke Johnson, Chief Legal Counsel and SVP of HR and Security, Ivanti, explores the legal responsibilities in AI governance, highlighting how cross-functional collaboration enables safe, ethical AI use while mitigating risk and

React to this headline:

Loading spinner

Why legal must lead on AI governance before it’s too late Read More »

AI hallucinations and their risk to cybersecurity operations

AI hallucinations and their risk to cybersecurity operations 2025-05-19 at 08:31 By Mirko Zorz AI systems can sometimes produce outputs that are incorrect or misleading, a phenomenon known as hallucinations. These errors can range from minor inaccuracies to misrepresentations that can misguide decision-making processes. Real world implications “If a company’s AI agent leverages outdated or

React to this headline:

Loading spinner

AI hallucinations and their risk to cybersecurity operations Read More »

Why EU encryption policy needs technical and civil society input

Why EU encryption policy needs technical and civil society input 2025-05-19 at 08:02 By Mirko Zorz In this Help Net Security interview, Full Professor at University of Leuven, unpacks the European Commission’s encryption agenda, urging a balanced, technically informed approach to lawful access that safeguards privacy, security, and fundamental rights across the EU. Given the

React to this headline:

Loading spinner

Why EU encryption policy needs technical and civil society input Read More »

How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”

How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World” 2025-05-15 at 07:34 By Mirko Zorz In this Help Net Security interview, Kim Crawley, cybersecurity expert and Professor at the Open Institute of Technology, discusses her upcoming book Digital Safety in a Dangerous World, which will feature her expert advice, as well

React to this headline:

Loading spinner

How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World” Read More »

Southwest Airlines CISO on tackling cyber risks in the aviation industry

Southwest Airlines CISO on tackling cyber risks in the aviation industry 2025-05-14 at 08:33 By Mirko Zorz In this Help Net Security interview, Carrie Mills, VP and CISO, Southwest Airlines talks about the cybersecurity challenges facing the aviation industry. She explains how being part of critical infrastructure, a major consumer brand, and an airline each

React to this headline:

Loading spinner

Southwest Airlines CISO on tackling cyber risks in the aviation industry Read More »

Insider risk management needs a human strategy

Insider risk management needs a human strategy 2025-05-14 at 08:01 By Mirko Zorz Insider risk is not just about bad actors. Most of the time, it’s about mistakes. Someone sends a sensitive file to the wrong address, or uploads a document to their personal cloud to work from home. In many cases, there is no

React to this headline:

Loading spinner

Insider risk management needs a human strategy Read More »

CISOs must speak business to earn executive trust

CISOs must speak business to earn executive trust 2025-05-13 at 09:33 By Mirko Zorz In this Help Net Security interview, Pritesh Parekh, VP, CISO at PagerDuty talks about how CISOs can change perceptions of their role, build influence across the organization, communicate risk in business terms, and use automation to support business goals. What do

React to this headline:

Loading spinner

CISOs must speak business to earn executive trust Read More »

AI vs AI: How cybersecurity pros can use criminals’ tools against them

AI vs AI: How cybersecurity pros can use criminals’ tools against them 2025-05-13 at 09:01 By Help Net Security For a while now, AI has played a part in cybersecurity. Now, agentic AI is taking center stage. Based on pre-programmed plans and objectives, agentic AI can make choices which optimize results without a need for

React to this headline:

Loading spinner

AI vs AI: How cybersecurity pros can use criminals’ tools against them Read More »

Breaking down silos in cybersecurity

Breaking down silos in cybersecurity 2025-05-13 at 08:34 By Help Net Security All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices, culture and operations. Their presence inhibits communication and collaboration. As companies scale from startup to mid-sized and beyond, silos multiply and ossify. As

React to this headline:

Loading spinner

Breaking down silos in cybersecurity Read More »

Review: Resilient Cybersecurity

Review: Resilient Cybersecurity 2025-05-13 at 08:01 By Mirko Zorz Resilient Cybersecurity touches on nearly every major function of enterprise cybersecurity, from threat detection and identity management to vendor risk and regulatory compliance. About the author Mark Dunkerley is a cybersecurity and technology leader with over 20 years of experience working in higher education, healthcare and

React to this headline:

Loading spinner

Review: Resilient Cybersecurity Read More »

Why security teams cannot rely solely on AI guardrails

Why security teams cannot rely solely on AI guardrails 2025-05-12 at 09:19 By Mirko Zorz In this Help Net Security interview, Dr. Peter Garraghan, CEO of Mindgard, discusses their research around vulnerabilities in the guardrails used to protect large AI models. The findings highlight how even billion-dollar LLMs can be bypassed using surprisingly simple techniques,

React to this headline:

Loading spinner

Why security teams cannot rely solely on AI guardrails Read More »

How agentic AI and non-human identities are transforming cybersecurity

How agentic AI and non-human identities are transforming cybersecurity 2025-05-08 at 09:03 By Help Net Security Within the average enterprise, non-human identities (NHIs) now outnumber employees, contractors, and customers by anything between 10-to-1 and 92-to-1. Add to this the fragmentation of human identity management resulting from authorizing a single person’s access to multiple on-premises, cloud

React to this headline:

Loading spinner

How agentic AI and non-human identities are transforming cybersecurity Read More »

Even the best safeguards can’t stop LLMs from being fooled

Even the best safeguards can’t stop LLMs from being fooled 2025-05-08 at 08:48 By Mirko Zorz In this Help Net Security interview, Michael Pound, Associate Professor at the University of Nottingham shares his insights on the cybersecurity risks associated with LLMs. He discusses common organizational mistakes and the necessary precautions for securing sensitive data when

React to this headline:

Loading spinner

Even the best safeguards can’t stop LLMs from being fooled Read More »

Scroll to Top