strategy

What CISOs can learn from the frontlines of fintech cybersecurity

What CISOs can learn from the frontlines of fintech cybersecurity 2025-05-29 at 09:03 By Mirko Zorz At Span Cyber Security Arena, I sat down with Ria Shetty, Director, Cyber Security & Resilience for Europe at Mastercard. Our conversation cut through the hype and focused on what CISOs deal with every day: how to embed security […]

React to this headline:

Loading spinner

What CISOs can learn from the frontlines of fintech cybersecurity Read More »

How to threat hunt Living Off The Land binaries

How to threat hunt Living Off The Land binaries 2025-05-29 at 07:32 By Help Net Security In this Help Net Security video, Lee Archinal, Senior Threat Hunter at Intel 471, walks through practical strategies for detecting malicious activity involving Living Off The Land binaries (LOLBins). These are legitimate tools built into operating systems, such as

React to this headline:

Loading spinner

How to threat hunt Living Off The Land binaries Read More »

Why data provenance must anchor every CISO’s AI governance strategy

Why data provenance must anchor every CISO’s AI governance strategy 2025-05-28 at 08:30 By Help Net Security Across the enterprise, artificial intelligence has crept into core functions – not through massive digital transformation programs, but through quiet, incremental adoption. Legal departments are summarizing contracts. HR is rewording sensitive employee communications. Compliance teams are experimenting with

React to this headline:

Loading spinner

Why data provenance must anchor every CISO’s AI governance strategy Read More »

Why app modernization can leave you less secure

Why app modernization can leave you less secure 2025-05-27 at 09:09 By Help Net Security Enterprises typically “modernize” access patterns for an application by enabling industry standard protocols like OIDC or SAML to provide single sign-on (SSO) for legacy apps via a cloud identity provider (IDP). That’s a major step towards better user experience, improved

React to this headline:

Loading spinner

Why app modernization can leave you less secure Read More »

How AI agents reshape industrial automation and risk management

How AI agents reshape industrial automation and risk management 2025-05-27 at 08:33 By Mirko Zorz In this Help Net Security interview, Michael Metzler, Vice President Horizontal Management Cybersecurity for Digital Industries at Siemens, discusses the cybersecurity implications of deploying AI agents in industrial environments. He talks about the risks that come with AI agents making

React to this headline:

Loading spinner

How AI agents reshape industrial automation and risk management Read More »

Outsourcing cybersecurity: How SMBs can make smart moves

Outsourcing cybersecurity: How SMBs can make smart moves 2025-05-23 at 08:32 By Anamarija Pogorelec Outsourcing cybersecurity can be a practical and affordable option. It allows small businesses to get the protection they need without straining their budgets, freeing up time and resources to focus on core operations. 76% of SMBs lack the in-house skills to

React to this headline:

Loading spinner

Outsourcing cybersecurity: How SMBs can make smart moves Read More »

The hidden gaps in your asset inventory, and how to close them

The hidden gaps in your asset inventory, and how to close them 2025-05-22 at 09:06 By Mirko Zorz In this Help Net Security interview, Tim Grieveson, CSO at ThingsRecon, breaks down the first steps security teams should take to regain visibility, the most common blind spots in asset discovery, and why context should drive risk

React to this headline:

Loading spinner

The hidden gaps in your asset inventory, and how to close them Read More »

What good threat intelligence looks like in practice

What good threat intelligence looks like in practice 2025-05-21 at 08:32 By Mirko Zorz In this Help Net Security interview, Anuj Goel, CEO of Cyware, discusses how threat intelligence is no longer a nice to have, it’s a core cyber defense requirement. But turning intelligence into action remains a challenge for many organizations. The path

React to this headline:

Loading spinner

What good threat intelligence looks like in practice Read More »

Third-party cyber risks and what you can do

Third-party cyber risks and what you can do 2025-05-21 at 07:31 By Help Net Security When a third-party tech vendor suffers a cyber incident, your business can feel the effects immediately. That’s why it’s crucial to treat vendor risk as part of your cybersecurity posture. In this Help Net Security video, Mike Toole, Director of

React to this headline:

Loading spinner

Third-party cyber risks and what you can do Read More »

Closing security gaps in multi-cloud and SaaS environments

Closing security gaps in multi-cloud and SaaS environments 2025-05-20 at 09:06 By Mirko Zorz In this Help Net Security interview, Kunal Modasiya, SVP, Product Management, GTM, and Growth at Qualys, discusses recent Qualys research on the state of cloud and SaaS security. He talks about how siloed visibility, fragmented tools, and a lack of incident

React to this headline:

Loading spinner

Closing security gaps in multi-cloud and SaaS environments Read More »

Why legal must lead on AI governance before it’s too late

Why legal must lead on AI governance before it’s too late 2025-05-20 at 08:05 By Mirko Zorz In this Help Net Security interview, Brooke Johnson, Chief Legal Counsel and SVP of HR and Security, Ivanti, explores the legal responsibilities in AI governance, highlighting how cross-functional collaboration enables safe, ethical AI use while mitigating risk and

React to this headline:

Loading spinner

Why legal must lead on AI governance before it’s too late Read More »

AI hallucinations and their risk to cybersecurity operations

AI hallucinations and their risk to cybersecurity operations 2025-05-19 at 08:31 By Mirko Zorz AI systems can sometimes produce outputs that are incorrect or misleading, a phenomenon known as hallucinations. These errors can range from minor inaccuracies to misrepresentations that can misguide decision-making processes. Real world implications “If a company’s AI agent leverages outdated or

React to this headline:

Loading spinner

AI hallucinations and their risk to cybersecurity operations Read More »

Building cybersecurity culture in science-driven organizations

Building cybersecurity culture in science-driven organizations 2025-05-15 at 08:31 By Mirko Zorz In this Help Net Security interview, Anne Sofie Roed Rasmussen, CISO at Novonesis, discusses how a science-driven organization approaches cybersecurity, aligning innovation with protection, measuring cultural progress, managing shadow IT, and earning trust from scientific leaders. How do you measure progress when it

React to this headline:

Loading spinner

Building cybersecurity culture in science-driven organizations Read More »

Southwest Airlines CISO on tackling cyber risks in the aviation industry

Southwest Airlines CISO on tackling cyber risks in the aviation industry 2025-05-14 at 08:33 By Mirko Zorz In this Help Net Security interview, Carrie Mills, VP and CISO, Southwest Airlines talks about the cybersecurity challenges facing the aviation industry. She explains how being part of critical infrastructure, a major consumer brand, and an airline each

React to this headline:

Loading spinner

Southwest Airlines CISO on tackling cyber risks in the aviation industry Read More »

Insider risk management needs a human strategy

Insider risk management needs a human strategy 2025-05-14 at 08:01 By Mirko Zorz Insider risk is not just about bad actors. Most of the time, it’s about mistakes. Someone sends a sensitive file to the wrong address, or uploads a document to their personal cloud to work from home. In many cases, there is no

React to this headline:

Loading spinner

Insider risk management needs a human strategy Read More »

CISOs must speak business to earn executive trust

CISOs must speak business to earn executive trust 2025-05-13 at 09:33 By Mirko Zorz In this Help Net Security interview, Pritesh Parekh, VP, CISO at PagerDuty talks about how CISOs can change perceptions of their role, build influence across the organization, communicate risk in business terms, and use automation to support business goals. What do

React to this headline:

Loading spinner

CISOs must speak business to earn executive trust Read More »

Breaking down silos in cybersecurity

Breaking down silos in cybersecurity 2025-05-13 at 08:34 By Help Net Security All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices, culture and operations. Their presence inhibits communication and collaboration. As companies scale from startup to mid-sized and beyond, silos multiply and ossify. As

React to this headline:

Loading spinner

Breaking down silos in cybersecurity Read More »

Review: Resilient Cybersecurity

Review: Resilient Cybersecurity 2025-05-13 at 08:01 By Mirko Zorz Resilient Cybersecurity touches on nearly every major function of enterprise cybersecurity, from threat detection and identity management to vendor risk and regulatory compliance. About the author Mark Dunkerley is a cybersecurity and technology leader with over 20 years of experience working in higher education, healthcare and

React to this headline:

Loading spinner

Review: Resilient Cybersecurity Read More »

How to give better cybersecurity presentations (without sounding like a robot)

How to give better cybersecurity presentations (without sounding like a robot) 2025-05-12 at 08:35 By Mirko Zorz Most people think great presenters are born with natural talent. Luka Krejci, a presentation expert, disagrees. “They are called presentation skills. Skills, not talent,” he says. “Any skill, be it dancing, football, or presenting, can be developed only

React to this headline:

Loading spinner

How to give better cybersecurity presentations (without sounding like a robot) Read More »

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules 2025-05-07 at 08:32 By Mirko Zorz Application security is changing fast. In this Help Net Security interview, Loris Gutic, Global CISO at Bright, talks about what it takes to keep up. Gutic explains how DevOps, containers, and serverless tools are shaping security, and shares

React to this headline:

Loading spinner

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules Read More »

Scroll to Top