regulation

The NIS2 Directive: How far does it reach?

The NIS2 Directive: How far does it reach? 2024-08-29 at 07:31 By Help Net Security The NIS2 Directive is one of the most recent efforts of the EU legislator to boost cybersecurity across the bloc and to keep up with the challenges of an increasingly digitalized society and growing cyber threats. As the name implies, […]

React to this headline:

Loading spinner

The NIS2 Directive: How far does it reach? Read More »

Third-party risk management is under the spotlight

Third-party risk management is under the spotlight 2024-08-29 at 06:01 By Help Net Security In the aftermath of the CrowdStrike IT outage, new research has uncovered a critical vulnerability within financial institutions regarding supply chain resilience. The outage has demonstrated the need for greater digital supply chain resilience, particularly in vital sectors such as financial

React to this headline:

Loading spinner

Third-party risk management is under the spotlight Read More »

A survival guide for data privacy in the age of federal inaction

A survival guide for data privacy in the age of federal inaction 2024-08-22 at 07:31 By Help Net Security Things change fast in the world of data privacy. Just earlier this year, the question I was being asked most frequently was, “How similar will the proposed federal privacy law (APRA) be to the EU’s GDPR?”

React to this headline:

Loading spinner

A survival guide for data privacy in the age of federal inaction Read More »

74% of ransomware victims were attacked multiple times in a year

74% of ransomware victims were attacked multiple times in a year 2024-08-12 at 07:01 By Help Net Security An alarming trend toward multiple, sometimes simultaneous cyber attacks forces business leaders to re-evaluate their cyber resilience strategies to address common points of failure, including inadequate identity system backup and recovery practices, according to Semperis. Survey of

React to this headline:

Loading spinner

74% of ransomware victims were attacked multiple times in a year Read More »

NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?

NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise? 2024-08-09 at 08:02 By Help Net Security The Network and Information Security (NIS) 2 Directive is possibly one of the most significant pieces of cybersecurity regulation to ever hit Europe. The 27 EU Member States have until 17 October 2024 to adopt and publish

React to this headline:

Loading spinner

NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise? Read More »

AI security 2024: Key insights for staying ahead of threats

AI security 2024: Key insights for staying ahead of threats 2024-08-08 at 07:01 By Mirko Zorz In this Help Net Security interview, Kojin Oshiba, co-founder of Robust Intelligence, discusses his journey from academic research to addressing AI security challenges in the industry. Oshiba highlights vulnerabilities in technology systems and the proactive measures needed to mitigate

React to this headline:

Loading spinner

AI security 2024: Key insights for staying ahead of threats Read More »

Leveraging dynamic configuration for seamless and compliant software changes

Leveraging dynamic configuration for seamless and compliant software changes 2024-07-31 at 06:01 By Mirko Zorz In this Help Net Security interview, Konrad Niemiec, CEO and Founder of Lekko, discusses the benefits of dynamic configuration in preventing system outages and enabling faster response times during incidents. Niemiec explains how dynamic configuration evolves feature flagging, supports operational

React to this headline:

Loading spinner

Leveraging dynamic configuration for seamless and compliant software changes Read More »

Most CISOs feel unprepared for new compliance regulations

Most CISOs feel unprepared for new compliance regulations 2024-07-26 at 06:31 By Help Net Security With the new stringent regulations, including the SEC’s cybersecurity disclosure rules in the USA and the Digital Operational Resilience Act (DORA) in the EU, a significant challenge is emerging for many organizations, according to Onyxia Cyber. CISO role has changed

React to this headline:

Loading spinner

Most CISOs feel unprepared for new compliance regulations Read More »

How CISOs enable ITDR approach through the principle of least privilege

How CISOs enable ITDR approach through the principle of least privilege 2024-07-25 at 07:31 By Help Net Security Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. For a good reason, too: Look no further than

React to this headline:

Loading spinner

How CISOs enable ITDR approach through the principle of least privilege Read More »

Cross-industry standards for data provenance in AI

Cross-industry standards for data provenance in AI 2024-07-22 at 07:31 By Mirko Zorz In this Help Net Security interview, Saira Jesani, Executive Director of the Data & Trust Alliance, discusses the role of data provenance in AI trustworthiness and its impact on AI models’ performance and reliability. Jesani highlights the collaborative process behind developing cross-industry

React to this headline:

Loading spinner

Cross-industry standards for data provenance in AI Read More »

Discover the growing threats to data security

Discover the growing threats to data security 2024-07-15 at 07:01 By Mirko Zorz In this Help Net Security interview, Pranava Adduri, CEO at Bedrock Security, discusses how businesses can identify and prioritize their data security risks. Adduri emphasizes the necessity of ongoing monitoring and automation to keep up with evolving threats and maintain the shortest

React to this headline:

Loading spinner

Discover the growing threats to data security Read More »

Top priorities for compliance leaders this year

Top priorities for compliance leaders this year 2024-07-12 at 06:31 By Help Net Security Legal, compliance and privacy leaders list strengthening their personal impact on company strategy as their top priority for 2024, according to Gartner. Improving third party risk management (TPRM), and ensuring compliance programs can keep pace with fast-moving regulatory requirements are the

React to this headline:

Loading spinner

Top priorities for compliance leaders this year Read More »

Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella

Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella 2024-07-09 at 07:31 By Help Net Security Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with Microsoft products and services. Over the past several years, Microsoft has suffered several serious attacks with

React to this headline:

Loading spinner

Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella Read More »

From passwords to passkeys: Enhancing security and user satisfaction

From passwords to passkeys: Enhancing security and user satisfaction 2024-06-20 at 07:01 By Mirko Zorz In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and improves user experience by simplifying the login process. Lamb also addresses the technical challenges and economic implications of

React to this headline:

Loading spinner

From passwords to passkeys: Enhancing security and user satisfaction Read More »

Enhancing security through collaboration with the open-source community

Enhancing security through collaboration with the open-source community 2024-06-18 at 07:32 By Mirko Zorz In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the potential risks and benefits of collaborating with the open-source community to enhance software security.

React to this headline:

Loading spinner

Enhancing security through collaboration with the open-source community Read More »

How businesses can integrate token technology into existing payment systems

How businesses can integrate token technology into existing payment systems 2024-06-13 at 07:02 By Mirko Zorz In this Help Net Security interview, Mark Nelsen, SVP and Global Head of Consumer Product at Visa, discusses the integration of token technology into existing payment systems. How do businesses integrate tokenization into their existing payment systems, and what

React to this headline:

Loading spinner

How businesses can integrate token technology into existing payment systems Read More »

Six months of SEC’s cyber disclosure rules

Six months of SEC’s cyber disclosure rules 2024-06-12 at 06:02 By Help Net Security In this Help Net Security video, Mark Millender, Senior Advisor of Global Executive Engagement at Tanium, discusses the overall sentiment from CISOs of large, public companies on the effectiveness and understanding of SEC’s cyber disclosure rules and common misconceptions and gray

React to this headline:

Loading spinner

Six months of SEC’s cyber disclosure rules Read More »

Despite increased budgets, organizations struggle with compliance

Despite increased budgets, organizations struggle with compliance 2024-05-24 at 07:31 By Help Net Security Only 40% of organizations feel fully prepared to meet the compliance demands of rising cybersecurity regulations, according to a new Swimlane report. Organizations still feel unprepared for new regulations despite 93% of organizations rethinking their strategies and 92% increasing budgets. In

React to this headline:

Loading spinner

Despite increased budgets, organizations struggle with compliance Read More »

Effective GRC programs rely on team collaboration

Effective GRC programs rely on team collaboration 2024-05-24 at 06:31 By Help Net Security One in three organizations are not currently able to proactively identify, assess, and mitigate risk with their GRC program, nor are they able to ensure compliance with regulations and frameworks – both key aspects of a mature, holistic GRC program, according

React to this headline:

Loading spinner

Effective GRC programs rely on team collaboration Read More »

SEC requires financial institutions to notify customers of breaches within 30 days

SEC requires financial institutions to notify customers of breaches within 30 days 2024-05-20 at 13:01 By Help Net Security The Securities and Exchange Commission (SEC) announced the adoption of amendments to Regulation S-P to modernize and enhance the rules that govern the treatment of consumers’ nonpublic personal information by certain financial institutions. The amendments update

React to this headline:

Loading spinner

SEC requires financial institutions to notify customers of breaches within 30 days Read More »

Scroll to Top