Please turn on your JavaScript for this page to function normally.
U.S. Cyber Trust Mark
U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity

The Biden-Harris Administration has announced a cybersecurity certification and labeling program to help Americans more easily choose smart devices that are safer and less …

Arthur Hu
Using AI/ML to optimize your tech stack and enhance business efficiency

In this Help Net Security interview, Arthur Hu, SVP, Global CIO and Services & Solutions Group CTO at Lenovo, discusses how AI/ML is optimizing tech stacks, the hurdles …

connected
Compliance seizes spotlight in the connected devices arena

Investment in connected device security has accelerated as upcoming legislation affecting the sector becomes more prominent, according to PSA Certified. This acceleration also …

Patricia Thaine
ChatGPT and data protection laws: Compliance challenges for businesses

In this Help Net Security interview, Patricia Thaine, CEO at Private AI, reviews the main privacy concerns when using ChatGPT in a business context, as well as the risks that …

brain
AI: Interpreting regulation and implementing good practice

Businesses have been using artificial intelligence for years, and while machine learning (ML) models have often been taken from open-source repositories and built into …

Zoom
Zoom announces privacy enhancements and tools

Zoom has introduced a new range of privacy enhancements and tools to make sure users have control over their data and their privacy preferences. These enhancements not only …

Europe
EU moves to regulate tech titans with Digital Services Act

The Commission adopted the first designation decisions under the Digital Services Act (DSA), designating 17 Very Large Online Platforms (VLOPs) and 2 Very Large Online Search …

PCI DSS
Are you ready for PCI DSS 4.0?

In just under a year’s time, organizations will have had to comply with several new requirements under version 4.0 of the Payment Card Industry Data Security Standard (PCI …

arrows
A third-party’s perspective on third-party InfoSec risk management

More than ever, organizations are relying on third parties to streamline operations, scale their business, expand and leverage expertise, and reduce costs. In the complex and …

Fraud losses
Pre-pandemic techniques are fueling record fraud rates

Within the largest financial institutions, insurers, and retailers, the rise and adoption of AI, an impending recession, and the return of pre-pandemic fraud techniques are …

eavesdropping
Consumers take data control into their own hands amid rising privacy concerns

Data Subject Requests (DSRs), which are formal requests made by individuals to access, modify, or delete their personal data held by a company, increased by 72% from 2021 to …

fix
We can’t wait for SBOMs to be demanded by regulation

Old ads can be startling—cigarette ads used to boast their health-giving properties, sugar-laden candy was once advertised as a dietary aid, and soft drinks were advertised as …

Don't miss

Cybersecurity news