compliance
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/25170731/mind-business-1500-400x200.webp)
Most CISOs feel unprepared for new compliance regulations
With the new stringent regulations, including the SEC’s cybersecurity disclosure rules in the USA and the Digital Operational Resilience Act (DORA) in the EU, a significant …
![Fintech companies](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/21163520/fintech_companies-1500-400x200.webp)
10 fintech companies to watch in 2024
The fintech market is experiencing a swift transformation driven by emerging technologies like Open Finance and GenAI, as highlighted by Juniper Research. This evolution is …
![Anand Pashupathy](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/09123752/anand_pashupathy-2-intel-400x200.webp)
Confidential AI: Enabling secure processing of sensitive data
In this Help Net Security interview, Anand Pashupathy, VP & GM, Security Software & Services Division at Intel, explains how Intel’s approach to confidential …
![Saira Jesani](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/17120119/saira_jesani-2-data_and_trust_alliance-400x200.webp)
Cross-industry standards for data provenance in AI
In this Help Net Security interview, Saira Jesani, Executive Director of the Data & Trust Alliance, discusses the role of data provenance in AI trustworthiness and its …
![networking](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/18155333/networking-400x200.jpg)
GenAI network acceleration requires prior WAN optimization
As GenAI models used for natural language processing, image generation, and other complex tasks often rely on large datasets that must be transmitted between distributed …
![digital identity](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20132920/digital_identity1-400x200.jpg)
Fighting AI-powered synthetic ID fraud with AI
Aided by the emergence of generative artificial intelligence models, synthetic identity fraud has skyrocketed, and now accounts for a staggering 85% of all identity fraud …
![ChatGPT](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/15162854/chatgpt-1500a-400x200.webp)
ChatGPTriage: How can CISOs see and control employees’ AI use?
It’s been less than 18 months since the public introduction of ChatGPT, which gained 100 million users in less than two months. Given the hype, you would expect enterprise …
![third party](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31195646/third-party2-400x200.webp)
How to design a third-party risk management framework
Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such as third-party networks, which …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26142115/compliance-400x200.jpg)
Top priorities for compliance leaders this year
Legal, compliance and privacy leaders list strengthening their personal impact on company strategy as their top priority for 2024, according to Gartner. Improving third party …
![Chaim Mazal](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24120927/chaim_mazal-2-gigamon-400x200.webp)
Strengthening cybersecurity preparedness with defense in depth
In this Help Net Security interview, Chaim Mazal, Chief Security Officer at Gigamon, discusses cybersecurity preparedness measures for businesses, the impact of international …
![microsoft cybersecurity dilemma](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07153226/microsoft_cybersecurity_dilemma-400x200.webp)
Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella
Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with …
![shadow egineering](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07133258/shadow_egineering-400x200.webp)
Shadow engineering exposed: Addressing the risks of unauthorized engineering practices
Shadow engineering is present in many organizations, and it can lead to security, compliance, and risk challenges. In this Help Net Security video, Darren Meyer, Staff …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege