policy

How Google’s 90-day TLS certificate validity proposal will affect enterprises

How Google’s 90-day TLS certificate validity proposal will affect enterprises 2024-04-11 at 08:01 By Help Net Security Announced last year, Google’s proposal to reduce the lifespan of TLS (transport layer security) certificates from 13 months to 90 days could be implemented in the near future. It will certainly improve security and shrink the window of […]

React to this headline:

Loading spinner

How Google’s 90-day TLS certificate validity proposal will affect enterprises Read More »

Stopping security breaches by managing AppSec posture

Stopping security breaches by managing AppSec posture 2024-04-11 at 06:01 By Help Net Security Many security vulnerabilities result from human error, and the majority of these are reflected in the application layer. These errors may occur at any stage in the software development life cycle, from code to cloud. In this Help Net Security video,

React to this headline:

Loading spinner

Stopping security breaches by managing AppSec posture Read More »

Make your code immutable to avoid jail, policy exec advises devs

Make your code immutable to avoid jail, policy exec advises devs 2024-04-10 at 05:02 By Cointelegraph by Brayden Lindrea Smart contracts that can be turned on and off by a multisignature mechanism or governance vote are potentially problematic, says Coin Center’s Peter Van Valkenburgh. This article is an excerpt from Cointelegraph.com News View Original Source

React to this headline:

Loading spinner

Make your code immutable to avoid jail, policy exec advises devs Read More »

How advances in AI are impacting business cybersecurity

How advances in AI are impacting business cybersecurity 2024-03-12 at 07:52 By Help Net Security While ChatGPT and Bard have proven to be valuable tools for developers, marketers, and consumers, they also carry the risk of unintentionally exposing sensitive and confidential data. From a security point of view, it always pays to think one step

React to this headline:

Loading spinner

How advances in AI are impacting business cybersecurity Read More »

Key areas that will define the intersection of AI and DevOps

Key areas that will define the intersection of AI and DevOps 2024-03-01 at 07:33 By Help Net Security Eficode research indicates that 96% of developers use AI tools, with most coders bypassing security policies to use them. With no standardized AI tool regulations, researchers advocate for stronger governance frameworks and AI security policies in organizations’

React to this headline:

Loading spinner

Key areas that will define the intersection of AI and DevOps Read More »

AI outsourcing: A strategic guide to managing third-party risks

AI outsourcing: A strategic guide to managing third-party risks 2024-02-15 at 08:01 By Help Net Security In an era of artificial intelligence (AI) revolutionizing business practices, many companies are turning to third-party AI services for a competitive edge. However, this approach comes with its own set of risks. From data security concerns to operational disruptions,

React to this headline:

Loading spinner

AI outsourcing: A strategic guide to managing third-party risks Read More »

How companies are misjudging their data privacy preparedness

How companies are misjudging their data privacy preparedness 2024-02-09 at 06:31 By Help Net Security In this Help Net Security video, Karen Schuler, Global Privacy & Data Protection Chair at BDO, discusses overconfidence in data privacy and data protection practices. There is an apparent disconnect between tech CFOs’ confidence and consumer perceptions. BDO’s 2024 Technology

React to this headline:

Loading spinner

How companies are misjudging their data privacy preparedness Read More »

The fight against commercial spyware misuse is heating up

The fight against commercial spyware misuse is heating up 2024-02-07 at 14:46 By Zeljka Zorz Though there are organizations out there investigating how commercial spyware is misused to target journalists, human rights defenders and dissidents, the growing market related to the development and sale of this type of software and the exploits used to deploy

React to this headline:

Loading spinner

The fight against commercial spyware misuse is heating up Read More »

The growing challenge of cyber risk in the age of synthetic media

The growing challenge of cyber risk in the age of synthetic media 2024-01-09 at 07:01 By Help Net Security As AI tools become more widespread, impersonation and deception have become easier. However, organizations are combating this issue with policies and technological solutions. In this Help Net Security video, Mike Bechtel, Chief Futurist at Deloitte, discusses

React to this headline:

Loading spinner

The growing challenge of cyber risk in the age of synthetic media Read More »

Many popular websites still cling to password creation policies from 1985

Many popular websites still cling to password creation policies from 1985 12/12/2023 at 09:01 By Helga Labus A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute of Technology have found. Websites’ lax creation policies for passwords The researchers used an automated account creation method

React to this headline:

Loading spinner

Many popular websites still cling to password creation policies from 1985 Read More »

Bridging the gap between cloud vs on-premise security

Bridging the gap between cloud vs on-premise security 01/12/2023 at 08:03 By Help Net Security With the proliferation of SaaS applications, remote work and shadow IT, organizations feel obliged to embrace cloud-based cybersecurity. And rightly so, because the corporate resources, traffic, and threats are no longer confined within the office premises. Cloud-based security initiatives, such

React to this headline:

Loading spinner

Bridging the gap between cloud vs on-premise security Read More »

Why it’s the perfect time to reflect on your software update policy

Why it’s the perfect time to reflect on your software update policy 27/11/2023 at 08:04 By Help Net Security The threat landscape is evolving by the minute, with both malicious actors and well-intentioned researchers constantly on the hunt for new attack vectors that bypass security controls and gain control of systems and applications. In fact,

React to this headline:

Loading spinner

Why it’s the perfect time to reflect on your software update policy Read More »

The hidden obstacles to integrating AI into your business

The hidden obstacles to integrating AI into your business 21/11/2023 at 07:02 By Help Net Security A mere 14% of organizations globally are fully prepared to deploy and leverage AI-powered technologies, according to Cisco. The report highlights companies’ preparedness to utilize and deploy AI, showcasing critical gaps across key business pillars and infrastructures that pose

React to this headline:

Loading spinner

The hidden obstacles to integrating AI into your business Read More »

Microsoft introduces new access policies in Entra to boost MFA usage

Microsoft introduces new access policies in Entra to boost MFA usage 07/11/2023 at 18:17 By Helga Labus As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID (formerly Azure Active Directory) to increase the use of multifactor authentication (MFA) for enterprise accounts. Microsoft Entra Conditional

React to this headline:

Loading spinner

Microsoft introduces new access policies in Entra to boost MFA usage Read More »

AI threat landscape: Model theft and inference attacks emerge as top concerns

AI threat landscape: Model theft and inference attacks emerge as top concerns 30/10/2023 at 08:31 By Mirko Zorz Generative AI has emerged as a powerful tool, heralded for its potential but also scrutinized for its implications. Enterprises will invest nearly $16 billion worldwide on GenAI solutions in 2023, according to IDC. In this Help Net

React to this headline:

Loading spinner

AI threat landscape: Model theft and inference attacks emerge as top concerns Read More »

What is operational risk and why should you care? Assessing SEC rule readiness for OT and IoT

What is operational risk and why should you care? Assessing SEC rule readiness for OT and IoT 25/10/2023 at 07:31 By Help Net Security The newly released Security and Exchange Commission (SEC) cyber incident disclosure rules have been met with mixed reviews. Of particular concern is whether public companies who own and operate industrial control

React to this headline:

Loading spinner

What is operational risk and why should you care? Assessing SEC rule readiness for OT and IoT Read More »

The real impact of the cybersecurity poverty line on small organizations

The real impact of the cybersecurity poverty line on small organizations 20/10/2023 at 07:03 By Mirko Zorz The financial constraints many smaller organizations face often cast shadows on their ability to fortify defenses. In this Help Net Security interview, Brent Deterding, CISO at Afni, delves into the realities and myths surrounding the cybersecurity poverty line,

React to this headline:

Loading spinner

The real impact of the cybersecurity poverty line on small organizations Read More »

On TikTok, White Supremacist ‘Active Club’ Recruitment Videos May Have Reached Millions

On TikTok, White Supremacist ‘Active Club’ Recruitment Videos May Have Reached Millions 17/10/2023 at 23:17 By Emily Baker-White, Forbes Staff The videos juxtapose traditional fitness and martial arts imagery with white supremacist flags, symbols, and messages. TikTok is now rushing to remove them. This article is an excerpt from Forbes – Cybersecurity View Original Source

React to this headline:

Loading spinner

On TikTok, White Supremacist ‘Active Club’ Recruitment Videos May Have Reached Millions Read More »

Why zero trust delivers even more resilience than you think

Why zero trust delivers even more resilience than you think 10/10/2023 at 08:04 By Help Net Security Ten years ago, zero trust was an exciting, innovative perspective shift that security experts were excited to explore; today, it’s more likely to be framed as an inevitable trend than as a mere option on the security menu.

React to this headline:

Loading spinner

Why zero trust delivers even more resilience than you think Read More »

How TikTok Has Exposed Celebrities And Politicians’ Closest Personal Contacts

How TikTok Has Exposed Celebrities And Politicians’ Closest Personal Contacts 27/09/2023 at 13:32 By Alexandra S. Levine, Forbes Staff TikTok and ByteDance staff’s easy access to the friend lists of the First Family and public figures has created national security and privacy risks ahead of the election. This article is an excerpt from Forbes –

React to this headline:

Loading spinner

How TikTok Has Exposed Celebrities And Politicians’ Closest Personal Contacts Read More »

Scroll to Top