Video

How AI is transforming consumer privacy expectations

How AI is transforming consumer privacy expectations 07/11/2023 at 08:01 By Help Net Security Consumers are concerned about their privacy with AI. Cisco discovered that 60% had lost trust in organizations due to their AI use. In this Help Net Security video, Robert Waitman, Director of Cisco’s Privacy Center of Excellence, discusses consumers’ perceptions and […]

React to this headline:

Loading spinner

How AI is transforming consumer privacy expectations Read More »

Securing data at the intersection of the CISO and CDO

Securing data at the intersection of the CISO and CDO 06/11/2023 at 08:34 By Help Net Security Two groups in particular play a key and critical role in ensuring data governance and security: the CISO and the CDO. CISOs are responsible for identifying and managing risks associated with data security, while CDOs are responsible for

React to this headline:

Loading spinner

Securing data at the intersection of the CISO and CDO Read More »

The role of Kubernetes in modern app management

The role of Kubernetes in modern app management 06/11/2023 at 07:03 By Help Net Security Kubernetes, often abbreviated as K8s, is an open-source container orchestration platform that has redefined the way modern applications are developed, deployed, and managed. Born out of Google’s internal container orchestration system, Kubernetes has become the de facto standard for containerized

React to this headline:

Loading spinner

The role of Kubernetes in modern app management Read More »

How cybercriminals adapt and thrive amidst changing consumer trends

How cybercriminals adapt and thrive amidst changing consumer trends 03/11/2023 at 08:36 By Help Net Security The email threat landscape is experiencing a profound transformation, adapting to new challenges and exploiting emerging vulnerabilities with speed and sophistication. In this Help Net Security video, Usman Choudhary, CPTO at VIPRE Security Group, discusses how cybercriminals modify their

React to this headline:

Loading spinner

How cybercriminals adapt and thrive amidst changing consumer trends Read More »

Why legacy system patching can’t wait

Why legacy system patching can’t wait 02/11/2023 at 07:32 By Help Net Security The persistent neglect of patching legacy systems is plaguing critical infrastructure and industries. The consequences of such neglect can be damaging to organizations, ranging from costly security vulnerabilities to compliance risk and operational inefficiencies. Thus, the question remains: why is the process

React to this headline:

Loading spinner

Why legacy system patching can’t wait Read More »

How security observability can help you fight cyber attacks

How security observability can help you fight cyber attacks 31/10/2023 at 08:31 By Help Net Security Security observability uses the external outputs of a system, its logs, metrics, and traces to infer risk, monitor threats, and alert on breaches. Security professionals use this close observation of system behavior to detect, understand, and stop new and

React to this headline:

Loading spinner

How security observability can help you fight cyber attacks Read More »

Finding the right approach to security awareness

Finding the right approach to security awareness 30/10/2023 at 09:02 By Help Net Security As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become increasingly vital. Security awareness training is essential and must be a live, evolving process. In this Help Net Security

React to this headline:

Loading spinner

Finding the right approach to security awareness Read More »

IoT’s convenience comes with cybersecurity challenges

IoT’s convenience comes with cybersecurity challenges 30/10/2023 at 07:03 By Help Net Security The rapid proliferation of Internet of Things (IoT) devices has ushered in a new era of connectivity and convenience, transforming the way we live and work. However, this interconnectivity has also given rise to a host of cybersecurity challenges and vulnerabilities. Protecting

React to this headline:

Loading spinner

IoT’s convenience comes with cybersecurity challenges Read More »

Strategies to overcome cybersecurity misconceptions

Strategies to overcome cybersecurity misconceptions 25/10/2023 at 07:02 By Help Net Security Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net Security video, Kevin Kirkwood, Deputy CISO at LogRhythm, stresses that one of the most significant pitfalls

React to this headline:

Loading spinner

Strategies to overcome cybersecurity misconceptions Read More »

Navigating OT/IT convergence and securing ICS environments

Navigating OT/IT convergence and securing ICS environments 23/10/2023 at 07:33 By Help Net Security Escalating threats to operational technology (OT) have prompted an increasing number of global enterprises to adopt sophisticated technologies and services to enhance the security of their assets. In this Help Net Security video, Christopher Warner, Senior GRC-OT Security Consultant at GuidePoint

React to this headline:

Loading spinner

Navigating OT/IT convergence and securing ICS environments Read More »

Cyberattacks put healthcare organizations on high alert

Cyberattacks put healthcare organizations on high alert 23/10/2023 at 06:04 By Help Net Security Healthcare organizations have become prime targets for cybercriminals due to the immense value of their data, including patient records, sensitive medical information, and financial data. The importance of protecting this invaluable information, alongside ensuring the seamless operation of medical devices and

React to this headline:

Loading spinner

Cyberattacks put healthcare organizations on high alert Read More »

Addressing cyber threats in healthcare operational technology

Addressing cyber threats in healthcare operational technology 19/10/2023 at 07:01 By Help Net Security The proliferation of connected medical devices (IoMT) in hospitals demands a holistic approach to cybersecurity beyond just the digital IT realm. Industrial cybersecurity (OT) requires integrated solutions to address its unique challenges. In this Help Net Security video, Estefanía Rojas Campos,

React to this headline:

Loading spinner

Addressing cyber threats in healthcare operational technology Read More »

How organizations can combat rising cloud costs with FinOps

How organizations can combat rising cloud costs with FinOps 16/10/2023 at 07:06 By Help Net Security When it comes to the cloud, many organizations prioritize speed over spend. In fact, spending on public cloud services is forecasted to grow 21.7% to a total of $597.3 billion in 2023, according to Gartner. How can organizations spend

React to this headline:

Loading spinner

How organizations can combat rising cloud costs with FinOps Read More »

Keeping control in complex regulatory environments

Keeping control in complex regulatory environments 16/10/2023 at 06:02 By Help Net Security Modern compliance programs represent a strategic shift in how companies approach regulatory and ethical obligations. They are designed to not only mitigate risks and avoid legal repercussions but also to enhance an organization’s reputation, foster a culture of integrity, and ultimately drive

React to this headline:

Loading spinner

Keeping control in complex regulatory environments Read More »

Introducing the book: Irreducibly Complex Systems

Introducing the book: Irreducibly Complex Systems 13/10/2023 at 06:32 By Help Net Security In this Help Net Security video interview, David Hunt, CTO at Prelude, discusses his book – Irreducibly Complex Systems: An Introduction to Continuous Security Testing. Continuous security testing (CST) is a new strategy for validating cyber defenses. We buy security products that

React to this headline:

Loading spinner

Introducing the book: Irreducibly Complex Systems Read More »

How cyber fusion is helping enterprises modernize security operations

How cyber fusion is helping enterprises modernize security operations 11/10/2023 at 07:02 By Help Net Security In this Help Net Security video, Anuj Goel, CEO at Cyware, explains how cyber fusion is helping enterprises modernize their security operations and turn their SOC from reactive to proactive. The post How cyber fusion is helping enterprises modernize

React to this headline:

Loading spinner

How cyber fusion is helping enterprises modernize security operations Read More »

Why security is the bedrock of success for mainframe projects

Why security is the bedrock of success for mainframe projects 10/10/2023 at 07:02 By Help Net Security Enterprises looking to update their mission-critical operations are approaching modernization in three ways – modernizing on the mainframe, integrating with the hyperscalers, or moving off to the cloud, according to a recent Kyndryl report. Almost all respondents use

React to this headline:

Loading spinner

Why security is the bedrock of success for mainframe projects Read More »

Automotive cybersecurity: A decade of progress and challenges

Automotive cybersecurity: A decade of progress and challenges 09/10/2023 at 07:31 By Help Net Security As connected cars become a standard feature in the market, the significance of automotive cybersecurity rises, playing an essential role in ensuring the safety of road users. In this Help Net Security video, Samantha Beaumont, Principal Security Consultant at IOActive,

React to this headline:

Loading spinner

Automotive cybersecurity: A decade of progress and challenges Read More »

Cyber insurance costs pressure business budgets

Cyber insurance costs pressure business budgets 09/10/2023 at 06:01 By Help Net Security Cyber insurance is a type of insurance policy that provides financial protection and support to individuals and organizations in the event of cyber incidents, including data breaches, hacking, ransomware attacks, and other cyber threats. It typically covers expenses such as data recovery,

React to this headline:

Loading spinner

Cyber insurance costs pressure business budgets Read More »

Are executives adequately guarding their gadgets?

Are executives adequately guarding their gadgets? 06/10/2023 at 07:02 By Help Net Security Today, individual citizens, rather than businesses or governmental bodies, are the main entry points for cyberattacks. However, security solutions haven’t evolved sufficiently to guard public figures and leaders as they do for large corporate entities. In this Help Net Security video, Amir

React to this headline:

Loading spinner

Are executives adequately guarding their gadgets? Read More »

Scroll to Top