![executive](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171247/executive-400x200.jpg)
The CISO’s approach to AI: Balancing transformation with trust
As organizations increasingly adopt third-party AI tools to streamline operations and gain a competitive edge, they also invite a host of new risks. Many companies are …
![Curtis Arnold](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/08142517/curtis_arnold-2-core4ce-400x200.webp)
Laying the groundwork for zero trust in the military
In this Help Net Security interview, Curtis Arnold, VP and Chief Scientist at Core4ce, discusses the starting points for military training in zero trust principles, …
![Ankita Gupta](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24133803/ankita_gupta-2-akto-400x200.webp)
Overlooked essentials: API security best practices
In this Help Net Security, Ankita Gupta, CEO at Akto, discusses API security best practices, advocating for authentication protocols like OAuth 2.0 and OpenID Connect, strict …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/05105929/gdpr-1500-1-400x200.webp)
GDPR turns six: Expert discusses AI impact
The European Union’s GDPR policy came into effect six years ago. Since then, it has become widely regarded as the standard for data sharing, but the rise of new technology has …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/07095552/ai-artificial_intelligence-1500-400x200.webp)
Unpacking CISA’s AI guidelines
CISA’s late April AI and infrastructure guidelines address 16 sectors along with their cybersecurity needs and operations concerning the growth of AI as a tool to build both …
![eyes](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20164642/eyes-400x200.jpg)
Avoiding the cybersecurity blame game
Cyber risk management has many components. Those who do it well will conduct comprehensive risk assessments, enact well-documented and well-communicated processes and …
![security](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27150233/security-1600-400x200.webp)
CISOs pursuing AI readiness should start by updating the org’s email security policy
Over the past few years, traditional phishing messages — with their pervasive linguistic errors, thinly-veiled malicious payloads, and often outlandish pretexts — have been on …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/24130337/cyber_insurance-1-400x200.jpg)
Are you meeting your cyber insurance requirements?
Cyber insurance policies are specifically designed to offer financial protection to organizations in the face of cyber attacks, data breaches, or other cybersecurity …
![Dana Wang](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/30142104/dana_wang-2-openssf-400x200.webp)
Establishing a security baseline for open source projects
In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) …
![human risk](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29221250/human-risk-400x200.webp)
Why SMBs are facing significant security, business risks
In this Help Net Security video, Alex Cox, Director of Threat Intelligence at LastPass, discusses how human factors are getting in the way while SMB leaders report investing …
![Charly Davis](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/24120005/charly_davis-2-sapphire-400x200.webp)
Making cybersecurity more appealing to women, closing the skills gap
In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women face in the cybersecurity industry. Davis …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29120648/cloud_security-1-400x200.jpg)
Building a strong cloud security posture
In this Help Net Security video, David Kellerman, Field CTO at Cymulate, discusses how cloud security still seems to lag even as the cloud grows in popularity and usage. Many …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege