Features
![Patrick Harding](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/15142120/patrick_harding-2-ping_identity-1-400x200.jpg)
How decentralized identity is shaping the future of data protection
In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the promises and implications of decentralized identity (DCI) in …
![Brad Arkin](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16111233/brad_arkin-2-salesforce-1-400x200.jpg)
Inside the strategy of Salesforce’s new Chief Trust Officer
Recently, Salesforce named Brad Arkin, previously Chief Security & Trust Officer at Cisco, the company’s new Chief Trust Officer. This was the perfect opportunity to find …
![Matt Shelton](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16111231/matt_shelton-2-google-1-400x200.jpg)
Rise in cyberwarfare tactics fueled by geopolitical tensions
In this Help Net Security interview, Matt Shelton, Head of Threat Research and Analysis at Google Cloud, discusses the latest Threat Horizons Report, which provides …
![Mick Baccio](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/15142107/mick_baccio-2-splunk-400x200.jpg)
The future of cybersecurity: Anticipating changes with data analytics and automation
In this Help Net Security interview, Mick Baccio, Staff Security Strategist at Splunk SURGe, discusses the future of cybersecurity, emphasizing the importance of data …
![Yaron Edan](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/06114350/yaron_edan-2-ree-400x200.jpg)
Integrating cybersecurity into vehicle design and manufacturing
In this Help Net Security interview, Yaron Edan, CISO at REE Automotive, discusses the cybersecurity landscape of the automotive industry, mainly focusing on electric and …
![Robin Long](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/06115347/robin_long-2-kiowa_security-400x200.jpg)
Key strategies for ISO 27001 compliance adoption
In this Help Net Security interview, Robin Long, founder of Kiowa Security, shares insights on how best to approach the implementation of the ISO/IEC 27001 information …
![Anya Shpilman](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/31122017/anya_shpilman-2-wdigital-400x200.jpg)
Choosing the right partner when outsourcing cybersecurity
In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential risks of outsourcing …
![Jamieson O'Reilly](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16114229/jamieson-oreilly-2-dvuln-400x200.jpg)
Enhancing adversary simulations: Learn the business to attack the business
In this Help Net Security interview, Jamieson O’Reilly, Founder of DVULN, discusses adversary simulations, shedding light on challenges rooted in human behavior, …
![Marco Eggerling](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16122954/marco_eggerling-2-check_point-400x200.jpg)
How CISOs navigate policies and access across enterprises
In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and …
![Roland Palmer](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18120415/roland_palmer-2-sumo_logic-400x200.jpg)
NIS2 Directive raises stakes for security leaders
In this Help Net Security interview, Roland Palmer, VP Global Operations Center at Sumo Logic, discusses key challenges and innovations of the NIS2 Directive, aiming to …
![Isaac Evans](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17115957/isaac_evans-2-semgrep-400x200.jpg)
Custom rules in security tools can be a game changer for vulnerability detection
In this Help Net interview, Isaac Evans, CEO at Semgrep, discusses the balance between speed and thoroughness in CI/CD pipeline security scanning. Stressing the need to avoid …
![Stephanie Hagopian](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/22122101/stephanie_hagopian-2-cdw-400x200.jpg)
Proactive cybersecurity: A strategic approach to cost efficiency and crisis management
In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of complex cyberattacks and the role of the …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege