strategy

Securing the video market: From identification to disruption

Securing the video market: From identification to disruption 2024-06-24 at 07:01 By Help Net Security Video piracy, a pressing issue often unnoticed in security discussions, is rising and demands immediate attention. In this Help Net Security video, Chris White, Chief Architect at Friend MTS, discusses monitoring, identifying, and disrupting piracy for the video market. He …

Securing the video market: From identification to disruption Read More »

React to this headline:

Loading spinner

Enhancing security through collaboration with the open-source community

Enhancing security through collaboration with the open-source community 2024-06-18 at 07:32 By Mirko Zorz In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the potential risks and benefits of collaborating with the open-source community to enhance software security. …

Enhancing security through collaboration with the open-source community Read More »

React to this headline:

Loading spinner

The rise of SaaS security teams

The rise of SaaS security teams 2024-06-17 at 07:31 By Mirko Zorz In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge in organizations establishing dedicated SaaS security teams is driven by significant data breaches involving widely used platforms. What motivated the recent surge in …

The rise of SaaS security teams Read More »

React to this headline:

Loading spinner

How businesses can integrate token technology into existing payment systems

How businesses can integrate token technology into existing payment systems 2024-06-13 at 07:02 By Mirko Zorz In this Help Net Security interview, Mark Nelsen, SVP and Global Head of Consumer Product at Visa, discusses the integration of token technology into existing payment systems. How do businesses integrate tokenization into their existing payment systems, and what …

How businesses can integrate token technology into existing payment systems Read More »

React to this headline:

Loading spinner

Security and privacy strategies for CISOs in a mobile-first world

Security and privacy strategies for CISOs in a mobile-first world 2024-06-12 at 07:01 By Mirko Zorz In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must shift their approach to data security, acknowledging the complexities introduced by mobile access to …

Security and privacy strategies for CISOs in a mobile-first world Read More »

React to this headline:

Loading spinner

Cybersecurity pros change strategies to combat AI-powered threats

Cybersecurity pros change strategies to combat AI-powered threats 2024-06-10 at 06:31 By Help Net Security 75% of security professionals had to change their cybersecurity strategy in the last year due to the rise in AI-powered cyber threats, with 73% expressing a greater focus on prevention capabilities, according to Deep Instinct. Additionally, 97% of respondents are …

Cybersecurity pros change strategies to combat AI-powered threats Read More »

React to this headline:

Loading spinner

26% of organizations lack any form of IT security training

26% of organizations lack any form of IT security training 2024-06-07 at 06:33 By Help Net Security 26% of organizations don’t provide IT security training to end-users, according to Hornetsecurity. The Hornetsecurity survey, which compiled feedback from industry professionals worldwide, also reveals that 8% of organizations offer adaptive training that evolves based on the results …

26% of organizations lack any form of IT security training Read More »

React to this headline:

Loading spinner

How AI-powered attacks are accelerating the shift to zero trust strategies

How AI-powered attacks are accelerating the shift to zero trust strategies 2024-06-05 at 07:01 By Mirko Zorz In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats. Markey discusses the impact of emerging threats like AI-generated …

How AI-powered attacks are accelerating the shift to zero trust strategies Read More »

React to this headline:

Loading spinner

Businesses must prioritize digital trust to avoid major problems

Businesses must prioritize digital trust to avoid major problems 2024-06-03 at 07:01 By Help Net Security As organizations pursue digital transformation, they urgently need to prioritize digital trust to achieve their goals and prepare for future market opportunities, legislation, and regulatory compliance, according to ISACA. The ISACA State of Digital Trust 2024 report finds that …

Businesses must prioritize digital trust to avoid major problems Read More »

React to this headline:

Loading spinner

How to combat alert fatigue in cybersecurity

How to combat alert fatigue in cybersecurity 2024-05-28 at 07:31 By Mirko Zorz In this Help Net Security interview, Ken Gramley, CEO at Stamus Networks, discusses the primary causes of alert fatigue in cybersecurity and DevOps environments. Alert fatigue results from the overwhelming volume of event data generated by security tools, the prevalence of false …

How to combat alert fatigue in cybersecurity Read More »

React to this headline:

Loading spinner

Despite increased budgets, organizations struggle with compliance

Despite increased budgets, organizations struggle with compliance 2024-05-24 at 07:31 By Help Net Security Only 40% of organizations feel fully prepared to meet the compliance demands of rising cybersecurity regulations, according to a new Swimlane report. Organizations still feel unprepared for new regulations despite 93% of organizations rethinking their strategies and 92% increasing budgets. In …

Despite increased budgets, organizations struggle with compliance Read More »

React to this headline:

Loading spinner

Strategies for combating AI-enhanced BEC attacks

Strategies for combating AI-enhanced BEC attacks 2024-05-21 at 07:31 By Mirko Zorz In this Help Net Security interview, Robert Haist, CISO at TeamViewer, discusses how AI is being leveraged by cybercriminals to enhance the effectiveness of BEC scams. How is AI being leveraged by cybercriminals to enhance the effectiveness of BEC scams? BEC attacks are …

Strategies for combating AI-enhanced BEC attacks Read More »

React to this headline:

Loading spinner

Start-Ups: 10 Tips for Navigating the Headwinds Against High-Growth

Start-Ups: 10 Tips for Navigating the Headwinds Against High-Growth 2024-05-20 at 14:16 By Jennifer Leggio These strategies can help cybersecurity startups navigate the current market dynamics, focusing on modern buyer behavior, updated KPIs, brand awareness, and effective sales and marketing alignment. The post Start-Ups: 10 Tips for Navigating the Headwinds Against High-Growth appeared first on …

Start-Ups: 10 Tips for Navigating the Headwinds Against High-Growth Read More »

React to this headline:

Loading spinner

The critical role of IT staffing in strengthening cybersecurity

The critical role of IT staffing in strengthening cybersecurity 2024-05-16 at 06:01 By Help Net Security Many organizations lack adequate IT staffing to combat cyber threats. A comprehensive approach to cybersecurity requires more than technical solutions. It involves the right staff with the unique expertise necessary to recognize and prevent potential threats. This makes IT …

The critical role of IT staffing in strengthening cybersecurity Read More »

React to this headline:

Loading spinner

Core security measures to strengthen privacy and data protection programs

Core security measures to strengthen privacy and data protection programs 2024-05-15 at 08:01 By Mirko Zorz As privacy laws evolve globally, organizations face increasing complexity in adapting their data protection strategies to stay compliant. In this Help Net Security interview, Kabir Barday, CEO at OneTrust, emphasizes that embracing privacy by design enables organizations to navigate …

Core security measures to strengthen privacy and data protection programs Read More »

React to this headline:

Loading spinner

Key questions to ask when tailoring defensive stacks

Key questions to ask when tailoring defensive stacks 2024-05-15 at 06:31 By Help Net Security In this Help Net Security video, Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber, outlines the questions you need to ask your security team when tailoring a defense stack against your current threat landscape. Small talks about what …

Key questions to ask when tailoring defensive stacks Read More »

React to this headline:

Loading spinner

How a GRC consultant passed the CISSP exam in six weeks

How a GRC consultant passed the CISSP exam in six weeks 2024-05-14 at 08:01 By Help Net Security Ask any IT security professional which certification they would consider to be the “gold standard” in terms of prestige, credibility, or difficulty, and almost invariably they will answer: the CISSP. If an organization is seeking some peace …

How a GRC consultant passed the CISSP exam in six weeks Read More »

React to this headline:

Loading spinner

Tailoring responsible AI: Defining ethical guidelines for industry-specific use

Tailoring responsible AI: Defining ethical guidelines for industry-specific use 2024-05-14 at 07:01 By Mirko Zorz In this Help Net Security interview, Chris Peake, CISO & SVP at Smartsheet, explains how responsible AI should be defined by each organization to guide their AI development and usage. Peake emphasizes that implementing responsible AI requires balancing ethical considerations, …

Tailoring responsible AI: Defining ethical guidelines for industry-specific use Read More »

React to this headline:

Loading spinner

Are you meeting your cyber insurance requirements?

Are you meeting your cyber insurance requirements? 2024-05-14 at 06:31 By Help Net Security Cyber insurance policies are specifically designed to offer financial protection to organizations in the face of cyber attacks, data breaches, or other cybersecurity incidents. While they can provide a sense of security, it’s crucial to be aware of their limitations. In …

Are you meeting your cyber insurance requirements? Read More »

React to this headline:

Loading spinner

Strategies for preventing AI misuse in cybersecurity

Strategies for preventing AI misuse in cybersecurity 2024-05-06 at 08:01 By Mirko Zorz As organizations increasingly adopt AI, they face unique challenges in updating AI models to keep pace with evolving threats while ensuring seamless integration into existing cybersecurity frameworks. In this Help Net Security interview, Pukar Hamal, CEO at SecurityPal, discusses the integration of …

Strategies for preventing AI misuse in cybersecurity Read More »

React to this headline:

Loading spinner
Scroll to Top