regulation
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/25170731/mind-business-1500-400x200.webp)
Most CISOs feel unprepared for new compliance regulations
With the new stringent regulations, including the SEC’s cybersecurity disclosure rules in the USA and the Digital Operational Resilience Act (DORA) in the EU, a significant …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/21112520/identity-id-400x200.webp)
How CISOs enable ITDR approach through the principle of least privilege
Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. …
![Saira Jesani](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/17120119/saira_jesani-2-data_and_trust_alliance-400x200.webp)
Cross-industry standards for data provenance in AI
In this Help Net Security interview, Saira Jesani, Executive Director of the Data & Trust Alliance, discusses the role of data provenance in AI trustworthiness and its …
![Pranava Adduri](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21131715/pranava_adduri-2-bedrock_security-400x200.webp)
Discover the growing threats to data security
In this Help Net Security interview, Pranava Adduri, CEO at Bedrock Security, discusses how businesses can identify and prioritize their data security risks. Adduri emphasizes …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26142115/compliance-400x200.jpg)
Top priorities for compliance leaders this year
Legal, compliance and privacy leaders list strengthening their personal impact on company strategy as their top priority for 2024, according to Gartner. Improving third party …
![microsoft cybersecurity dilemma](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07153226/microsoft_cybersecurity_dilemma-400x200.webp)
Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella
Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with …
![Julianna Lamb](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/12095639/julianna_lamb-2-stytch-400x200.webp)
From passwords to passkeys: Enhancing security and user satisfaction
In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and …
![Alan Dekok](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/07131822/alan_dekok-2-networkradius-400x200.webp)
Enhancing security through collaboration with the open-source community
In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the …
![Mark Nelsen](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/05124651/mark_nelsen-2-visa-400x200.webp)
How businesses can integrate token technology into existing payment systems
In this Help Net Security interview, Mark Nelsen, SVP and Global Head of Consumer Product at Visa, discusses the integration of token technology into existing payment systems. …
![Securities and Exchange Commission](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/31085518/sec2-400x200.jpg)
Six months of SEC’s cyber disclosure rules
In this Help Net Security video, Mark Millender, Senior Advisor of Global Executive Engagement at Tanium, discusses the overall sentiment from CISOs of large, public companies …
![cybersecurity regulations](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/02145135/cybersecurity_regulations-1400-400x200.jpg)
Despite increased budgets, organizations struggle with compliance
Only 40% of organizations feel fully prepared to meet the compliance demands of rising cybersecurity regulations, according to a new Swimlane report. Organizations still feel …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27110446/insider-threat-1500-400x200.webp)
Effective GRC programs rely on team collaboration
One in three organizations are not currently able to proactively identify, assess, and mitigate risk with their GRC program, nor are they able to ensure compliance with …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege