How to design a third-party risk management framework

Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such as third-party networks, which can be used by hackers to attack an organization. Through a strong TPRM framew… Continue reading How to design a third-party risk management framework

Strengthening cybersecurity preparedness with defense in depth

In this Help Net Security interview, Chaim Mazal, Chief Security Officer at Gigamon, discusses cybersecurity preparedness measures for businesses, the impact of international inconsistencies on global operations, and the board’s role in cybersecu… Continue reading Strengthening cybersecurity preparedness with defense in depth

Cloud migration expands the CISO role yet again

The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud environment… Continue reading Cloud migration expands the CISO role yet again

GDPR turns six: Expert discusses AI impact

The European Union’s GDPR policy came into effect six years ago. Since then, it has become widely regarded as the standard for data sharing, but the rise of new technology has questioned its suitability and relevance. In this Help Net Security video, C… Continue reading GDPR turns six: Expert discusses AI impact

You Can Pre-Order Framework Laptop 13 with an Intel Core Ultra Processor

Framework announced its latest Framework Laptop 13 with support for Intel Core Ultra processors and an optional 13.5-inch 2.8K high refresh rate display.
The post You Can Pre-Order Framework Laptop 13 with an Intel Core Ultra Processor appeared first o… Continue reading You Can Pre-Order Framework Laptop 13 with an Intel Core Ultra Processor

The evolution of security metrics for NIST CSF 2.0

CISOs have long been spreadsheet aficionados, soaking up metrics and using them as KPIs for security progress. These metrics have traditionally measured specific systems or single indicators — vulnerabilities detected, percentage of vulnerabilities pat… Continue reading The evolution of security metrics for NIST CSF 2.0

How to combat alert fatigue in cybersecurity

In this Help Net Security interview, Ken Gramley, CEO at Stamus Networks, discusses the primary causes of alert fatigue in cybersecurity and DevOps environments. Alert fatigue results from the overwhelming volume of event data generated by security too… Continue reading How to combat alert fatigue in cybersecurity

What is cybersecurity mesh architecture (CSMA)?

Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA approach means designing a security architecture that is composable and scalable with easily extensible interfaces, a … Continue reading What is cybersecurity mesh architecture (CSMA)?

Overcoming GenAI challenges in healthcare cybersecurity

In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on patient privacy. What are the key cybersecurity challenges in healthcare in the co… Continue reading Overcoming GenAI challenges in healthcare cybersecurity