Video

Stopping security breaches by managing AppSec posture

Stopping security breaches by managing AppSec posture 2024-04-11 at 06:01 By Help Net Security Many security vulnerabilities result from human error, and the majority of these are reflected in the application layer. These errors may occur at any stage in the software development life cycle, from code to cloud. In this Help Net Security video, […]

React to this headline:

Loading spinner

Stopping security breaches by managing AppSec posture Read More »

AI risks under the auditor’s lens more than ever

AI risks under the auditor’s lens more than ever 2024-04-10 at 07:01 By Help Net Security According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology’s use. In this Help Net Security video, Thomas Teravainen, a Research Specialist at Gartner,

React to this headline:

Loading spinner

AI risks under the auditor’s lens more than ever Read More »

Defining a holistic GRC strategy

Defining a holistic GRC strategy 2024-04-09 at 06:31 By Help Net Security End-user spending on security and risk management will total $215 billion in 2024, according to Gartner. In this Help Net Security video, Nicholas Kathmann, CISO at LogicGate, discusses why companies are turning to a holistic GRC strategy. Businesses often consider GRC a “necessary

React to this headline:

Loading spinner

Defining a holistic GRC strategy Read More »

How malicious email campaigns continue to slip through the cracks

How malicious email campaigns continue to slip through the cracks 2024-04-08 at 07:01 By Help Net Security In this Help Net Security video, Josh Bartolomie, VP of Global Threat Services at Cofense, discusses how email will remain a target as long as it remains the predominant form of communication within a business. Cofense researchers have

React to this headline:

Loading spinner

How malicious email campaigns continue to slip through the cracks Read More »

Threat actors are raising the bar for cyber attacks

Threat actors are raising the bar for cyber attacks 2024-04-08 at 06:02 By Help Net Security From sophisticated nation-state-sponsored intrusions to opportunistic malware campaigns, cyber attacks manifest in various forms, targeting vulnerabilities in networks, applications, and user behavior. The consequences of successful cyber attacks can be severe, ranging from financial losses and reputational damage to

React to this headline:

Loading spinner

Threat actors are raising the bar for cyber attacks Read More »

How manual access reviews might be weakening your defenses

How manual access reviews might be weakening your defenses 2024-04-05 at 06:31 By Help Net Security As businesses evolve, they often experience changes in roles, partnerships, and staff turnover. This dynamic can result in improper access to data and resources. Such mismanagement leads to superfluous expenses from excessive software licensing fees and heightens the risk

React to this headline:

Loading spinner

How manual access reviews might be weakening your defenses Read More »

Strengthening defenses against nation-state and for-profit cyber attacks

Strengthening defenses against nation-state and for-profit cyber attacks 2024-04-04 at 06:32 By Help Net Security There is an urgent need to secure tactical, operational, and strategic critical assets from the edge to the core. In this Help Net Security video, Geoffrey Mattson, CEO of Xage Security, discusses the steps enterprises and critical infrastructure must take

React to this headline:

Loading spinner

Strengthening defenses against nation-state and for-profit cyber attacks Read More »

Human risk is the top cyber threat for IT teams

Human risk is the top cyber threat for IT teams 2024-04-03 at 06:32 By Help Net Security After another year rife with cybercrime, IT and cyber leaders are confronted with a new reality. AI and deepfakes can trick even the most well-trained employee, and executing a strong cyber defense is more important than ever. In

React to this headline:

Loading spinner

Human risk is the top cyber threat for IT teams Read More »

Why AI forensics matters now

Why AI forensics matters now 2024-04-02 at 07:01 By Help Net Security In this Help Net Security video, Sylvia Acevedo, who serves on the Boards of Qualcomm and Credo, discusses why companies should invest in forensic capabilities and why forensics will be such an important topic as AI continues to be integrated into infrastructures and

React to this headline:

Loading spinner

Why AI forensics matters now Read More »

Securing privacy in the face of expanding data volumes

Securing privacy in the face of expanding data volumes 2024-04-01 at 06:01 By Help Net Security One of the primary concerns regarding data privacy is the potential for breaches and unauthorized access. Whether it’s financial records, medical histories, or personal communications, individuals have a right to control who can access their data and for what

React to this headline:

Loading spinner

Securing privacy in the face of expanding data volumes Read More »

How CISOs tackle business payment fraud

How CISOs tackle business payment fraud 2024-03-28 at 07:01 By Help Net Security In this Help Net Security video, Shai Gabay, CEO of Trustmi, discusses why payments are a source of cyber worry for CISOs. CISOs are worried about Business Email Compromise (BEC), cyber attackers’ use of AI, and securing the supply chain. These are

React to this headline:

Loading spinner

How CISOs tackle business payment fraud Read More »

Cybersecurity essentials during M&A surge

Cybersecurity essentials during M&A surge 2024-03-27 at 06:01 By Help Net Security The volume of mergers and acquisitions has surged significantly this quarter. Data from Dealogic shows a 130% increase in US M&A activity, totaling $288 billion. Worldwide M&A has also seen a substantial uptick, rising by 56% to $453 billion. Considering the rise in

React to this headline:

Loading spinner

Cybersecurity essentials during M&A surge Read More »

How threat intelligence data maximizes business operations

How threat intelligence data maximizes business operations 2024-03-26 at 07:02 By Help Net Security Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizations a new

React to this headline:

Loading spinner

How threat intelligence data maximizes business operations Read More »

How immersive AI transforms skill development

How immersive AI transforms skill development 2024-03-25 at 07:01 By Help Net Security Organizations are becoming more laser-focused on extracting the value of AI, moving from the experimentation phase toward adoption. While the potential for AI is limitless, AI expertise sadly is not. In this Help Net Security video, David Harris, Principal Generative AI Author

React to this headline:

Loading spinner

How immersive AI transforms skill development Read More »

Cybercriminals use ChatGPT’s prompts as weapons

Cybercriminals use ChatGPT’s prompts as weapons 2024-03-25 at 06:01 By Help Net Security Developed by OpenAI, ChatGPT has garnered attention across industries for its ability to generate relevant responses to various queries. However, as the adoption of ChatGPT accelerates, so do discussions surrounding its ethical and security implications. Organizations grapple with questions about data privacy,

React to this headline:

Loading spinner

Cybercriminals use ChatGPT’s prompts as weapons Read More »

Inside the book – See Yourself in Cyber: Security Careers Beyond Hacking

Inside the book – See Yourself in Cyber: Security Careers Beyond Hacking 2024-03-22 at 07:01 By Help Net Security In this Help Net Security video, Ed Adams, president and CEO of Security Innovation, discusses his new book See Yourself in Cyber: Security Careers Beyond Hacking. The book, published by Wiley, explores the breadth and depth

React to this headline:

Loading spinner

Inside the book – See Yourself in Cyber: Security Careers Beyond Hacking Read More »

Using cloud development environments to secure source code

Using cloud development environments to secure source code 2024-03-21 at 07:01 By Help Net Security In this Help Net Security video, Rob Whiteley, CEO at Coder, discusses the cloud development environment (CDE) technology landscape and its benefits. From the earliest stages of writing code to deploying finalized applications, CDEs are reimagining the developer experience, gaining

React to this headline:

Loading spinner

Using cloud development environments to secure source code Read More »

Security best practices for GRC teams

Security best practices for GRC teams 2024-03-20 at 06:31 By Help Net Security Even with the best-of-the-best tools and tech stack monitoring vulnerabilities, every security executive and GRC leader should still have some layer of paranoia. If they don’t, that’s a huge issue. In this Help Net Security video, Shrav Mehta, CEO at Secureframe, talks

React to this headline:

Loading spinner

Security best practices for GRC teams Read More »

Why is everyone talking about certificate automation?

Why is everyone talking about certificate automation? 2024-03-19 at 07:19 By Help Net Security Digital Certificates are not new. In this Help Net Security video, Andreas Brix, Senior Program Manager at GlobalSign, discusses why they are back in the news and what you should do about it. The post Why is everyone talking about certificate

React to this headline:

Loading spinner

Why is everyone talking about certificate automation? Read More »

Harnessing the power of privacy-enhancing tech for safer AI adoption

Harnessing the power of privacy-enhancing tech for safer AI adoption 2024-03-18 at 12:01 By Help Net Security A consensus on regulatory AI frameworks seems distant. Yet, the imperative for secure and responsible AI deployment cannot be overstated. How can leaders proactively address AI adoption challenges while waiting for regulatory clarity? In this Help Net Security

React to this headline:

Loading spinner

Harnessing the power of privacy-enhancing tech for safer AI adoption Read More »

Scroll to Top