strategy

AI is transforming financial crime compliance

AI is transforming financial crime compliance 03/11/2023 at 07:01 By Help Net Security While 86% of compliance, operations, risk and IT professionals at banks and non-banking financial institutions (NBFIs) surveyed said they would increase spending on AI and ML over the next two years, a 93% of respondents said that instead of using automation to […]

React to this headline:

Loading spinner

AI is transforming financial crime compliance Read More »

Cybersecurity workforce shortages: 67% report people deficits

Cybersecurity workforce shortages: 67% report people deficits 02/11/2023 at 09:02 By Help Net Security The global cybersecurity workforce has reached 5.5 million people, an 8.7% increase from 2022, representing 440,000 new jobs, according to ISC2. While this is the highest workforce ever recorded, the report shows that demand is still outpacing the supply. The cybersecurity

React to this headline:

Loading spinner

Cybersecurity workforce shortages: 67% report people deficits Read More »

How human behavior research informs security strategies

How human behavior research informs security strategies 02/11/2023 at 08:01 By Mirko Zorz In this Help Net Security interview, Kai Roer, CEO at Praxis Security Labs, explores the theoretical underpinnings, practical implications, and the crucial role of human behavior in cybersecurity. Roer explains why a comprehensive understanding of human complexity is paramount in today’s security

React to this headline:

Loading spinner

How human behavior research informs security strategies Read More »

From Windows 9x to 11: Tracing Microsoft’s security evolution

From Windows 9x to 11: Tracing Microsoft’s security evolution 31/10/2023 at 09:01 By Mirko Zorz Over its journey from Windows 9x to Windows 11, Microsoft has implemented multiple security overhauls, each addressing the challenges of its time and setting the stage for future developments. In this Help Net Security interview, we feature security researcher Alex

React to this headline:

Loading spinner

From Windows 9x to 11: Tracing Microsoft’s security evolution Read More »

White House issues Executive Order for safe, secure, and trustworthy AI

White House issues Executive Order for safe, secure, and trustworthy AI 30/10/2023 at 15:47 By Help Net Security President Biden issued a landmark Executive Order to ensure that America leads the way in seizing the promise and managing the risks of artificial intelligence (AI). New standards for AI safety and security As AI’s capabilities grow,

React to this headline:

Loading spinner

White House issues Executive Order for safe, secure, and trustworthy AI Read More »

Companies scramble to integrate immediate recovery into ransomware plans

Companies scramble to integrate immediate recovery into ransomware plans 30/10/2023 at 08:01 By Help Net Security More than one-third of companies still do not have a well-rounded, holistic ransomware strategy in place, according to Zerto. Immediate recovery crucial for businesses’ survival The survey also found that companies are reevaluating their data protection and cyber resilience

React to this headline:

Loading spinner

Companies scramble to integrate immediate recovery into ransomware plans Read More »

Strategies to overcome cybersecurity misconceptions

Strategies to overcome cybersecurity misconceptions 25/10/2023 at 07:02 By Help Net Security Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net Security video, Kevin Kirkwood, Deputy CISO at LogRhythm, stresses that one of the most significant pitfalls

React to this headline:

Loading spinner

Strategies to overcome cybersecurity misconceptions Read More »

Scaling rapidly? Your application security strategies need to keep up

Scaling rapidly? Your application security strategies need to keep up 23/10/2023 at 07:01 By Help Net Security Modern application security strategies must support and enable modern software development, even as it rapidly scales, according to Mend.io. Just 52% of companies can effectively remediate critical vulnerabilities and only 41% are confident they can manage the security

React to this headline:

Loading spinner

Scaling rapidly? Your application security strategies need to keep up Read More »

The real impact of the cybersecurity poverty line on small organizations

The real impact of the cybersecurity poverty line on small organizations 20/10/2023 at 07:03 By Mirko Zorz The financial constraints many smaller organizations face often cast shadows on their ability to fortify defenses. In this Help Net Security interview, Brent Deterding, CISO at Afni, delves into the realities and myths surrounding the cybersecurity poverty line,

React to this headline:

Loading spinner

The real impact of the cybersecurity poverty line on small organizations Read More »

Addressing cyber threats in healthcare operational technology

Addressing cyber threats in healthcare operational technology 19/10/2023 at 07:01 By Help Net Security The proliferation of connected medical devices (IoMT) in hospitals demands a holistic approach to cybersecurity beyond just the digital IT realm. Industrial cybersecurity (OT) requires integrated solutions to address its unique challenges. In this Help Net Security video, Estefanía Rojas Campos,

React to this headline:

Loading spinner

Addressing cyber threats in healthcare operational technology Read More »

Cyber resilience starts in the C-suite

Cyber resilience starts in the C-suite 19/10/2023 at 06:33 By Help Net Security In many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives — only 33% of CEOs or managing directors and 21% of other senior leaders are heavily involved, according to Commvault. According to the research, 52% of senior

React to this headline:

Loading spinner

Cyber resilience starts in the C-suite Read More »

The evolution of deception tactics from traditional to cyber warfare

The evolution of deception tactics from traditional to cyber warfare 18/10/2023 at 07:33 By Mirko Zorz Admiral James A. Winnefeld, USN (Ret.), is the former vice chairman of the Joint Chiefs of Staff and is an advisor to Acalvio Technologies. In this Help Net Security interview, he compares the strategies of traditional and cyber warfare,

React to this headline:

Loading spinner

The evolution of deception tactics from traditional to cyber warfare Read More »

10 essential cybersecurity cheat sheets available for free

10 essential cybersecurity cheat sheets available for free 18/10/2023 at 07:02 By Help Net Security Cheat sheets are concise, to-the-point references tailored for instant insights. This article provides a curated list of 10 essential cybersecurity cheat sheets, all free to download. Whether you’re seeking a quick refresher or a beginner trying to make sense of

React to this headline:

Loading spinner

10 essential cybersecurity cheat sheets available for free Read More »

SMBs seek help as cyber threats reach an all-time high

SMBs seek help as cyber threats reach an all-time high 18/10/2023 at 06:32 By Help Net Security Understanding the evolving threat landscape is the biggest cybersecurity challenge facing SMBs, including non-for-profit organizations – and more than half are calling for help to manage the risks, according to Sage. Globally, 48% of SMBs have experienced a

React to this headline:

Loading spinner

SMBs seek help as cyber threats reach an all-time high Read More »

How to go from collecting risk data to actually reducing risk?

How to go from collecting risk data to actually reducing risk? 17/10/2023 at 08:17 By Help Net Security Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: they need to move beyond finding risks to effectively mitigating risk. Making that transition starts with a shift from using “risks

React to this headline:

Loading spinner

How to go from collecting risk data to actually reducing risk? Read More »

The collaborative power of CISOs, CTOs and CIOs for a secure future

The collaborative power of CISOs, CTOs and CIOs for a secure future 17/10/2023 at 07:03 By Mirko Zorz In this Help Net Security interview, Phil Venables, CISO at Google Cloud, discusses the results of a recent Google report on board collaboration with the C-suite — particularly the CIO, CTO, and CISO to stay current with

React to this headline:

Loading spinner

The collaborative power of CISOs, CTOs and CIOs for a secure future Read More »

CISOs and board members are finding a common language

CISOs and board members are finding a common language 16/10/2023 at 07:39 By Help Net Security 86% of CISOs believe generative AI will alleviate skills gaps and talent shortages on the security team, filling labor-intensive and time-consuming security functions and freeing up security professionals to be more strategic, according to Splunk. 35% report using generative

React to this headline:

Loading spinner

CISOs and board members are finding a common language Read More »

How organizations can combat rising cloud costs with FinOps

How organizations can combat rising cloud costs with FinOps 16/10/2023 at 07:06 By Help Net Security When it comes to the cloud, many organizations prioritize speed over spend. In fact, spending on public cloud services is forecasted to grow 21.7% to a total of $597.3 billion in 2023, according to Gartner. How can organizations spend

React to this headline:

Loading spinner

How organizations can combat rising cloud costs with FinOps Read More »

Inadequate IoT protection can be a costly mistake

Inadequate IoT protection can be a costly mistake 16/10/2023 at 06:34 By Help Net Security 97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research survey also found that 98% of organizations experienced certificate outages in the last 12 months, costing an average of over

React to this headline:

Loading spinner

Inadequate IoT protection can be a costly mistake Read More »

Introducing the book: Irreducibly Complex Systems

Introducing the book: Irreducibly Complex Systems 13/10/2023 at 06:32 By Help Net Security In this Help Net Security video interview, David Hunt, CTO at Prelude, discusses his book – Irreducibly Complex Systems: An Introduction to Continuous Security Testing. Continuous security testing (CST) is a new strategy for validating cyber defenses. We buy security products that

React to this headline:

Loading spinner

Introducing the book: Irreducibly Complex Systems Read More »

Scroll to Top