Avoiding vendor lock-in when using managed cloud security services

In this Help Net Security interview, Marina Segal, CEO at Tamnoon, discusses the most significant obstacles when implementing managed cloud security in hybrid and multi-cloud environments. She shares insights on long onboarding times, legacy security g… Continue reading Avoiding vendor lock-in when using managed cloud security services

Security and privacy concerns challenge public sector’s efforts to modernize

For most public sector organizations, digital transformation is a work in progress, with the complexity of integrating new systems and privacy and security concerns remaining key barriers, according to a report by SolarWinds. Only 6% of respondents rep… Continue reading Security and privacy concerns challenge public sector’s efforts to modernize

The overlooked risks of poor data hygiene in AI-driven organizations

In this Help Net Security interview, Oliver Friedrichs, CEO at Pangea, discusses why strong data hygiene is more important than ever as companies integrate AI into their operations. With AI-driven applications handling sensitive enterprise data, poor a… Continue reading The overlooked risks of poor data hygiene in AI-driven organizations

Exposed APIs and issues in the world’s largest organizations

In this Help Net Security video, Tristan Kalos, CEO of Escape, discusses the results of its 2024 State of API Exposure report. The study highlights significant API security gaps affecting Fortune 1000 organizations, with over 28,500 exposed APIs and 98… Continue reading Exposed APIs and issues in the world’s largest organizations

The future of cyber insurance: Meeting the demand for non-attack coverage

In this Help Net Security interview, Michael Daum, Head of Global Cyber Claims for Allianz Commercial, discusses the significant rise in cyber claims in 2024, driven by an increase in data breaches and ransomware attacks. Daum highlights the need for b… Continue reading The future of cyber insurance: Meeting the demand for non-attack coverage

Evolving cloud threats: Insights and recommendations

Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by leveraging adversary-in-the-middle (AITM) attacks to bypass multi-factor authen… Continue reading Evolving cloud threats: Insights and recommendations

15% of office workers use unsanctioned GenAI tools

Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. Understanding workplace behavior key to strengt… Continue reading 15% of office workers use unsanctioned GenAI tools

3 easy microsegmentation projects

Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device service connectivity. One web server should connect to specific databases but … Continue reading 3 easy microsegmentation projects

3 tips for securing IoT devices in a connected world

IoT devices have become integral to how many organizations operate. From Smart TVs in conference rooms to connected sensors and wireless security cameras, these connected devices are now a fixture in the modern workplace. They also, however, present a … Continue reading 3 tips for securing IoT devices in a connected world