regulation

Navigating regulation challenges for protecting sensitive healthcare data

Navigating regulation challenges for protecting sensitive healthcare data 2024-03-06 at 07:10 By Help Net Security In this Help Net Security video, Chris Bowen, CISO at ClearDATA, emphasizes the importance of digital health companies being more transparent with their users. As more and more Americans flock to direct-to-consumer digital health apps and resources, most people don’t […]

React to this headline:

Loading spinner

Navigating regulation challenges for protecting sensitive healthcare data Read More »

3 free data protection regulation courses you can take right now

3 free data protection regulation courses you can take right now 2024-03-05 at 07:31 By Help Net Security Increasingly, information about us, and even by us, is being processed. Even mundane or insignificant details can be combined and linked with other data in a manner that may intrude upon or pose a risk to our

React to this headline:

Loading spinner

3 free data protection regulation courses you can take right now Read More »

Secure your hybrid workforce: The advantages of encrypted storage

Secure your hybrid workforce: The advantages of encrypted storage 2024-03-05 at 07:02 By Help Net Security In this Help Net Security video, Ryan Amparo, Field Application Engineer at Kingston Technology, discusses the benefits of encrypted external SSDs and USBs for hybrid workforces. He talks about the differences between software and hardware encryption, why it’s important,

React to this headline:

Loading spinner

Secure your hybrid workforce: The advantages of encrypted storage Read More »

What organizations need to know about the Digital Operational Resilience Act (DORA)

What organizations need to know about the Digital Operational Resilience Act (DORA) 2024-03-05 at 06:31 By Mirko Zorz In this Help Net Security interview, Kris Lovejoy, Global Security and Resilience Leader at Kyndryl, discusses the impact of the Digital Operational Resilience Act (DORA) on organizations across the EU, particularly in ICT risk management and cybersecurity.

React to this headline:

Loading spinner

What organizations need to know about the Digital Operational Resilience Act (DORA) Read More »

Key areas that will define the intersection of AI and DevOps

Key areas that will define the intersection of AI and DevOps 2024-03-01 at 07:33 By Help Net Security Eficode research indicates that 96% of developers use AI tools, with most coders bypassing security policies to use them. With no standardized AI tool regulations, researchers advocate for stronger governance frameworks and AI security policies in organizations’

React to this headline:

Loading spinner

Key areas that will define the intersection of AI and DevOps Read More »

NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure

NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure 2024-02-27 at 08:20 By Help Net Security The National Institute of Standards and Technology (NIST) has updated its widely utilized Cybersecurity Framework (CSF), a key document for mitigating cybersecurity risks. The latest version, 2.0, is tailored to cater to a broad

React to this headline:

Loading spinner

NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure Read More »

Escalating cyber threats spark demand for stronger regulations

Escalating cyber threats spark demand for stronger regulations 2024-02-26 at 06:32 By Help Net Security As the frequency and sophistication of cyber threats continue to escalate, the need for robust cybersecurity regulations has never been more critical. In this Help Net Security round-up, we present segments from previously recorded videos in which cybersecurity experts underscore

React to this headline:

Loading spinner

Escalating cyber threats spark demand for stronger regulations Read More »

AI-generated voices in robocalls now illegal

AI-generated voices in robocalls now illegal 2024-02-09 at 14:32 By Help Net Security The FCC has revealed the unanimous adoption of a Declaratory Ruling that recognizes calls made with AI-generated voices are “artificial” under the Telephone Consumer Protection Act (TCPA). The ruling, which takes effect immediately, makes voice cloning technology used in common robocall scams

React to this headline:

Loading spinner

AI-generated voices in robocalls now illegal Read More »

Key strategies for ISO 27001 compliance adoption

Key strategies for ISO 27001 compliance adoption 2024-02-09 at 07:32 By Mirko Zorz In this Help Net Security interview, Robin Long, founder of Kiowa Security, shares insights on how best to approach the implementation of the ISO/IEC 27001 information security standard. Long advises organizations to establish a detailed project roadmap and to book certification audits

React to this headline:

Loading spinner

Key strategies for ISO 27001 compliance adoption Read More »

How companies are misjudging their data privacy preparedness

How companies are misjudging their data privacy preparedness 2024-02-09 at 06:31 By Help Net Security In this Help Net Security video, Karen Schuler, Global Privacy & Data Protection Chair at BDO, discusses overconfidence in data privacy and data protection practices. There is an apparent disconnect between tech CFOs’ confidence and consumer perceptions. BDO’s 2024 Technology

React to this headline:

Loading spinner

How companies are misjudging their data privacy preparedness Read More »

Choosing the right partner when outsourcing cybersecurity

Choosing the right partner when outsourcing cybersecurity 2024-02-08 at 07:31 By Mirko Zorz In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential risks of outsourcing cybersecurity services. She compares the cost-effectiveness of outsourcing to maintaining an in-house team, noting the challenges of recruitment, training,

React to this headline:

Loading spinner

Choosing the right partner when outsourcing cybersecurity Read More »

NIS2 Directive raises stakes for security leaders

NIS2 Directive raises stakes for security leaders 2024-02-02 at 08:01 By Mirko Zorz In this Help Net Security interview, Roland Palmer, VP Global Operations Center at Sumo Logic, discusses key challenges and innovations of the NIS2 Directive, aiming to standardize cybersecurity practices across sectors. NIS2 mandates minimal cybersecurity requirements for member companies, encompassing policies on

React to this headline:

Loading spinner

NIS2 Directive raises stakes for security leaders Read More »

Essential questions for developing effective human rights policies

Essential questions for developing effective human rights policies 2024-01-26 at 06:31 By Help Net Security Growing environmental, social, and governance (ESG) expectations and expanding global regulation are propelling organizations to consider implementing a stand-alone human rights policy, according to Gartner. Public focus on human rights Shareholder proposals and media reports continue to put human rights

React to this headline:

Loading spinner

Essential questions for developing effective human rights policies Read More »

Budget cuts loom for data privacy initiatives

Budget cuts loom for data privacy initiatives 2024-01-26 at 06:01 By Help Net Security The past year saw developments and updates to privacy regulations across the globe—from India’s Personal Data Protection Bill to Brazil’s General Data Protection Law, according to ISACA. However, only 34% of organizations say they find it easy to understand their privacy

React to this headline:

Loading spinner

Budget cuts loom for data privacy initiatives Read More »

CISOs’ role in identifying tech components and managing supply chains

CISOs’ role in identifying tech components and managing supply chains 2024-01-25 at 07:01 By Mirko Zorz In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains and achieving comprehensive visibility. Warfield also discusses the vital collaboration between security and

React to this headline:

Loading spinner

CISOs’ role in identifying tech components and managing supply chains Read More »

In 2024, AI and ML shift from flashy to functional

In 2024, AI and ML shift from flashy to functional 2024-01-25 at 06:31 By Help Net Security AI and ML deserve the hype they get, but the focus can’t always be on the glitz. As these advances to deliver real benefits, there’s a slew of more mundane actions that have to be taken—and in 2024,

React to this headline:

Loading spinner

In 2024, AI and ML shift from flashy to functional Read More »

Why cyberattacks mustn’t be kept secret

Why cyberattacks mustn’t be kept secret 2024-01-23 at 08:01 By Help Net Security No company is immune to cyberattacks, but when the inevitable happens, too many companies still try to maintain a wall of silence. In fact, over half of security professionals admit their organizations maintain a culture of security through obscurity, with over one-third

React to this headline:

Loading spinner

Why cyberattacks mustn’t be kept secret Read More »

Beyond blockchain: Strategies for seamless digital asset integration

Beyond blockchain: Strategies for seamless digital asset integration 2024-01-23 at 07:31 By Mirko Zorz In this Help Net Security interview, Jean-Philippe Aumasson, CSO at Taurus, emphasizes the often-overlooked complexities of key generation, storage, and distribution, underlining the necessity for a high level of security maturity in handling digital assets. Looking ahead, Aumasson predicts that the

React to this headline:

Loading spinner

Beyond blockchain: Strategies for seamless digital asset integration Read More »

Without clear guidance, SEC’s new rule on incident reporting may be detrimental

Without clear guidance, SEC’s new rule on incident reporting may be detrimental 2024-01-22 at 08:01 By Help Net Security The SEC has instituted a set of guidelines “requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance.” These new

React to this headline:

Loading spinner

Without clear guidance, SEC’s new rule on incident reporting may be detrimental Read More »

The reality of hacking threats in connected car systems

The reality of hacking threats in connected car systems 2024-01-22 at 07:31 By Mirko Zorz With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of personal and operational data. This shift brings forth unique cybersecurity challenges, ranging from hacking and

React to this headline:

Loading spinner

The reality of hacking threats in connected car systems Read More »

Scroll to Top