Risk Management

How network segmentation can strengthen visibility in OT networks

How network segmentation can strengthen visibility in OT networks 2024-08-08 at 07:31 By Help Net Security What role does the firewall play in the protection of operational technology (OT) networks and systems? Many would say that it’s the defensive mechanism to protect that environment from IT and the outside world. For the operators responsible for […]

React to this headline:

Loading spinner

How network segmentation can strengthen visibility in OT networks Read More »

AI security 2024: Key insights for staying ahead of threats

AI security 2024: Key insights for staying ahead of threats 2024-08-08 at 07:01 By Mirko Zorz In this Help Net Security interview, Kojin Oshiba, co-founder of Robust Intelligence, discusses his journey from academic research to addressing AI security challenges in the industry. Oshiba highlights vulnerabilities in technology systems and the proactive measures needed to mitigate

React to this headline:

Loading spinner

AI security 2024: Key insights for staying ahead of threats Read More »

Secure by Default: What It Means for the Modern Enterprise

Secure by Default: What It Means for the Modern Enterprise 2024-08-07 at 16:01 By Matt Honea What does “secure by default” mean for the average company as you implement security systems and protocols? The post Secure by Default: What It Means for the Modern Enterprise appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Secure by Default: What It Means for the Modern Enterprise Read More »

Breaking down FCC’s proposal to strengthen BGP security

Breaking down FCC’s proposal to strengthen BGP security 2024-08-07 at 06:31 By Mirko Zorz In this Help Net Security interview, Doug Madory, Director of Internet Analysis at Kentik, discusses the FCC’s proposal requiring major U.S. ISPs to implement RPKI Route Origin Validation (ROV), and addresses concerns about the impact on smaller ISPs and the global

React to this headline:

Loading spinner

Breaking down FCC’s proposal to strengthen BGP security Read More »

AI in the Enterprise: Cutting Through the Hype and Assessing Real Risks

AI in the Enterprise: Cutting Through the Hype and Assessing Real Risks 2024-08-05 at 16:47 By Joshua Goldfarb The introduction of AI can bring benefits to the enterprise while not introducing additional risk that is beyond acceptable levels. The post AI in the Enterprise: Cutting Through the Hype and Assessing Real Risks appeared first on

React to this headline:

Loading spinner

AI in the Enterprise: Cutting Through the Hype and Assessing Real Risks Read More »

Vanta Raises $150 Million at $2.45 Billion Valuation

Vanta Raises $150 Million at $2.45 Billion Valuation 2024-07-24 at 15:46 By Eduard Kovacs Vanta has raised $150 million in a Series C funding round and it plans on using the money to fuel expansion and AI innovation. The post Vanta Raises $150 Million at $2.45 Billion Valuation appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Vanta Raises $150 Million at $2.45 Billion Valuation Read More »

The CISO’s approach to AI: Balancing transformation with trust

The CISO’s approach to AI: Balancing transformation with trust 2024-07-23 at 07:31 By Help Net Security As organizations increasingly adopt third-party AI tools to streamline operations and gain a competitive edge, they also invite a host of new risks. Many companies are unprepared, lacking clear policies and adequate employee training to mitigate these new dangers.

React to this headline:

Loading spinner

The CISO’s approach to AI: Balancing transformation with trust Read More »

How to design a third-party risk management framework

How to design a third-party risk management framework 2024-07-12 at 07:31 By Help Net Security Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such as third-party networks, which can be used by hackers to attack an organization. Through a strong TPRM framework, companies gain

React to this headline:

Loading spinner

How to design a third-party risk management framework Read More »

Managing cyberattack fallout: Financial and operational damage

Managing cyberattack fallout: Financial and operational damage 2024-07-12 at 07:01 By Mirko Zorz In this Help Net Security, Ashley Harrington, Director of Cybersecurity at Aspida, discusses the impact of cyberattack on business operations and financial health. Beyond immediate disruptions and financial burdens, cyber incident can severely damage a company’s reputation among customers and partners. Can

React to this headline:

Loading spinner

Managing cyberattack fallout: Financial and operational damage Read More »

It’s Time to Reassess Your Cybersecurity Priorities

It’s Time to Reassess Your Cybersecurity Priorities 2024-07-10 at 15:01 By Torsten George A cyber resilience strategy is vital for business continuity and can provide a range of benefits before, during, and after a cyberattack. The post It’s Time to Reassess Your Cybersecurity Priorities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

It’s Time to Reassess Your Cybersecurity Priorities Read More »

Six months of SEC’s cyber disclosure rules

Six months of SEC’s cyber disclosure rules 2024-06-12 at 06:02 By Help Net Security In this Help Net Security video, Mark Millender, Senior Advisor of Global Executive Engagement at Tanium, discusses the overall sentiment from CISOs of large, public companies on the effectiveness and understanding of SEC’s cyber disclosure rules and common misconceptions and gray

React to this headline:

Loading spinner

Six months of SEC’s cyber disclosure rules Read More »

Cloud migration expands the CISO role yet again

Cloud migration expands the CISO role yet again 2024-06-11 at 07:31 By Help Net Security The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud environments, the responsibilities and challenges for

React to this headline:

Loading spinner

Cloud migration expands the CISO role yet again Read More »

AI’s role in accelerating vulnerability management

AI’s role in accelerating vulnerability management 2024-06-10 at 08:01 By Help Net Security With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In the field of vulnerability management specifically, AI is poised to have a profound impact, enhancing two key areas: Providing quicker analysis and

React to this headline:

Loading spinner

AI’s role in accelerating vulnerability management Read More »

Why CISOs need to build cyber fault tolerance into their business

Why CISOs need to build cyber fault tolerance into their business 2024-06-10 at 07:01 By Help Net Security CISOs who elevate response and recovery to equal status with prevention are generating more value than those who adhere to outdated zero tolerance for failure mindsets, according to Gartner. “Each new cybersecurity disruption exposes the fact that

React to this headline:

Loading spinner

Why CISOs need to build cyber fault tolerance into their business Read More »

Avoiding the cybersecurity blame game

Avoiding the cybersecurity blame game 2024-05-29 at 07:31 By Help Net Security Cyber risk management has many components. Those who do it well will conduct comprehensive risk assessments, enact well-documented and well-communicated processes and controls, and fully implemented monitoring and review requirements. Processes and controls typically comprise policies, which will include detailed explanations of the

React to this headline:

Loading spinner

Avoiding the cybersecurity blame game Read More »

Effective GRC programs rely on team collaboration

Effective GRC programs rely on team collaboration 2024-05-24 at 06:31 By Help Net Security One in three organizations are not currently able to proactively identify, assess, and mitigate risk with their GRC program, nor are they able to ensure compliance with regulations and frameworks – both key aspects of a mature, holistic GRC program, according

React to this headline:

Loading spinner

Effective GRC programs rely on team collaboration Read More »

Post-FTX crypto industry needs education before regulation: Former Biden advisor

Post-FTX crypto industry needs education before regulation: Former Biden advisor 2024-05-15 at 15:01 By Cointelegraph by Zoltan Vardai “What I preach for is regulation that protects and prevents but does not cripple and destroy [innovation],” the senior adviser told Cointelegraph. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Post-FTX crypto industry needs education before regulation: Former Biden advisor Read More »

The complexities of third-party risk management

The complexities of third-party risk management 2024-05-08 at 06:31 By Help Net Security In this Help Net Security video, Brad Hibbert, Chief Strategy Officer and Chief Operating Officer for Prevalent, discusses five interesting findings from a recent industry study on third-party risk management and what he thinks they mean for cybersecurity professionals and their companies’

React to this headline:

Loading spinner

The complexities of third-party risk management Read More »

Understanding emerging AI and data privacy regulations

Understanding emerging AI and data privacy regulations 2024-05-02 at 08:01 By Mirko Zorz In this Help Net Security interview, Sophie Stalla-Bourdillon, Senior Privacy Counsel & Legal Engineer at Immuta, discusses the AI Act, the Data Act, and the Health Data Space Regulation. Learn how these regulations interact, their implications for both public and private sectors,

React to this headline:

Loading spinner

Understanding emerging AI and data privacy regulations Read More »

A closer look at Apiiro’s SHINE partner program

A closer look at Apiiro’s SHINE partner program 2024-05-01 at 16:46 By Help Net Security In this Help Net Security video, Adam LaGreca, Founder of 10KMedia, sat down with John Leon, VP of Partnerships at Apiiro, discusses the company’s new technology partner program SHINE. The name stands for the program’s guiding principles – Seamless, Holistic,

React to this headline:

Loading spinner

A closer look at Apiiro’s SHINE partner program Read More »

Scroll to Top