Mirko Zorz
![Ava Chawla](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/15115019/ava_chawla-2-algosec-400x200.webp)
Cloud security threats CISOs need to know about
In this Help Net Security interview, Ava Chawla, Head of Cloud Security at AlgoSec, discusses the most significant cloud security threats CISOs must be aware of in 2024. These …
![Karthik Swarnam](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/18114127/karthik_swarnam-2-armorcode-400x200.webp)
Cybersecurity ROI: Top metrics and KPIs
In this Help Net Security interview, Karthik Swarnam, Chief Security and Trust Officer at ArmorCode, discusses key metrics and KPIs to measure cybersecurity ROI. Swarnam …
![SaaS](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27135719/saas-400x200.jpg)
Despite economic uncertainty, organizations are prioritizing SaaS security investments
In this Help Net Security video, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the key findings of their recent annual SaaS Security Survey Report, conducted in …
![Anand Pashupathy](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/09123752/anand_pashupathy-2-intel-400x200.webp)
Confidential AI: Enabling secure processing of sensitive data
In this Help Net Security interview, Anand Pashupathy, VP & GM, Security Software & Services Division at Intel, explains how Intel’s approach to confidential …
![Saira Jesani](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/17120119/saira_jesani-2-data_and_trust_alliance-400x200.webp)
Cross-industry standards for data provenance in AI
In this Help Net Security interview, Saira Jesani, Executive Director of the Data & Trust Alliance, discusses the role of data provenance in AI trustworthiness and its …
![Shuffle Automation](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/10135440/shuffle_automation-1500-400x200.webp)
Shuffle Automation: Open-source security automation platform
Shuffle is an open-source automation platform designed by and for security professionals. While security operations are inherently complex, Shuffle simplifies the process. …
![Curtis Arnold](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/08142517/curtis_arnold-2-core4ce-400x200.webp)
Laying the groundwork for zero trust in the military
In this Help Net Security interview, Curtis Arnold, VP and Chief Scientist at Core4ce, discusses the starting points for military training in zero trust principles, …
![Ankita Gupta](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24133803/ankita_gupta-2-akto-400x200.webp)
Overlooked essentials: API security best practices
In this Help Net Security, Ankita Gupta, CEO at Akto, discusses API security best practices, advocating for authentication protocols like OAuth 2.0 and OpenID Connect, strict …
![SubSnipe](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07154904/subsnipe-1500-400x200.webp)
SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
SubSnipe is an open-source, multi-threaded tool to help find subdomains vulnerable to takeover. It’s simpler, produces better output, and has more fingerprints than …
![Seth Hodgson](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24124221/seth_hodgson-2-udemy-400x200.webp)
Managing exam pressure: Tips for certification preparation
In this Help Net Security interview, Seth Hodgson, SVP of Engineering at Udemy, discusses effective study techniques for cybersecurity certification exams. Hodgson discusses …
![Realm](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152013/realm-1500-400x200.webp)
Realm: Open-source adversary emulation framework
Realm is an open-source adversary emulation framework emphasizing scalability, reliability, and automation. It’s designed to handle engagements of any size. “Realm …
![Pranava Adduri](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21131715/pranava_adduri-2-bedrock_security-400x200.webp)
Discover the growing threats to data security
In this Help Net Security interview, Pranava Adduri, CEO at Bedrock Security, discusses how businesses can identify and prioritize their data security risks. Adduri emphasizes …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege