The key pillars of domain security

From branded emails and marketing campaigns to critical protocols, internal portals, and internet traffic, domains are central to digital enterprise operations. They are constantly created for new assets and initiatives. In this Help Net Security video… Continue reading The key pillars of domain security

Who owns customer identity?

When I’m talking with prospective clients, I like to ask: which department owns customer identity? Everyone immediately looks towards a different team. While every team touches customer identity at some point, the teams that own it differ from organiza… Continue reading Who owns customer identity?

AI set to enhance cybersecurity roles, not replace them

In this Help Net Security interview, Caleb Sima, Chair of CSA AI Security Alliance, discusses how AI empowers security pros, emphasizing its role in enhancing skills and productivity rather than replacing staff. AI is seen as empowering rather than rep… Continue reading AI set to enhance cybersecurity roles, not replace them

Leveraging AI for enhanced compliance and governance

In this Help Net Security interview, Dr. Joseph Sweeney, Advisor at IBRS, discusses the risks of integrating AI into information management systems. He talks about emerging trends such as content cognition. He predicts advancements in AI-driven informa… Continue reading Leveraging AI for enhanced compliance and governance

Stopping security breaches by managing AppSec posture

Many security vulnerabilities result from human error, and the majority of these are reflected in the application layer. These errors may occur at any stage in the software development life cycle, from code to cloud. In this Help Net Security video, Go… Continue reading Stopping security breaches by managing AppSec posture

AI risks under the auditor’s lens more than ever

According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology’s use. In this Help Net Security video, Thomas Teravainen, a Research Specialist … Continue reading AI risks under the auditor’s lens more than ever

How manual access reviews might be weakening your defenses

As businesses evolve, they often experience changes in roles, partnerships, and staff turnover. This dynamic can result in improper access to data and resources. Such mismanagement leads to superfluous expenses from excessive software licensing fees an… Continue reading How manual access reviews might be weakening your defenses