Three essential elements of a successful Zero Trust cybersecurity program

Organizations have traditionally deployed cybersecurity approaches that adhered to the phrase made famous by President Ronald Reagan: “Trust, but verify.” This meant that most users and activities were considered “safe,” as long as simple standards wer… Continue reading Three essential elements of a successful Zero Trust cybersecurity program

When will the GDPR pot boil over? It’s sooner (and different) than you think

There’s an old saying that a watched pot never boils. In reality, the sauce in that pot is heating up in a way we can’t quite see yet. After the major compliance ramp by companies in 2018, a lot of us thought the impact of GDPR would be instant and boi… Continue reading When will the GDPR pot boil over? It’s sooner (and different) than you think

Securing the cloud: Visibility, compliance and vulnerability management

In this Help Net Security podcast recorded at Black Hat USA 2019, Hari Srinivasan, Director of Product Management for Qualys, talks about the basics of securing your cloud. Here’s a transcript of the podcast for your convenience. Hello and welcome to t… Continue reading Securing the cloud: Visibility, compliance and vulnerability management

With shadow IT running rampant, how can IT keep pace?

Data privacy is high on the minds of businesses and consumers alike, as society at large is getting wise to the potential dangers that even seemingly innocuous apps (ie. FaceApp) might expose them to. That’s why it’s critical that enterprise IT teams p… Continue reading With shadow IT running rampant, how can IT keep pace?

Automating CCPA compliance: Organize your data and manage requests

Time is running out for California-based businesses to prepare for the California Consumer Privacy Act (CCPA), which goes into effect on January 1, 2020. Despite the Act being big news in the information security industry since its passing, many outsid… Continue reading Automating CCPA compliance: Organize your data and manage requests

Protecting iOS and Android applications in a fully automated way

In this Help Net Security podcast recorded at Black Hat USA 2019, Dave Belt, Technology Evangelist at Irdeto, and Jaco du Plooy, VP Cloakware at Irdeto, discuss the current threat landscape, software security trends, and the importance of protecting iO… Continue reading Protecting iOS and Android applications in a fully automated way

Red teaming: Why a forward offense is the best defense

Companies are under constant threat. Opportunistic attackers scan the internet for weak points, motivated attackers target specific organizations for susceptibility to a scam or digital exploit, and persistent attackers don’t give up until they get wha… Continue reading Red teaming: Why a forward offense is the best defense

Closing the cyber skills gap: What to do next

On a global scale, cybersecurity is suffering from a severe shortage of experts. What is to be done? Organizations, government, academia and professional associations need to work together to develop a sustainable cyber skills strategy. To date, strate… Continue reading Closing the cyber skills gap: What to do next

Extending security to fourth parties your business needs, but doesn’t control

While there is much discussion about the data security and privacy risks created by third parties, another source of risk can be significant but overlooked: that from fourth parties – those vendors that your vendors use – who may be integral players in… Continue reading Extending security to fourth parties your business needs, but doesn’t control

AI vs. AI: Cybersecurity battle royale

David and Goliath. The Invasion of Normandy. No matter the generation, we all know some of the storied battles that have withstood the test of time. In cyberspace, however, there’s a fierce battle brewing surrounding artificial intelligence. With AI pr… Continue reading AI vs. AI: Cybersecurity battle royale