The NHI management challenge: When employees leave

An employee is exiting your organization. Regardless of the terms of departure, an ex-staffer has the potential when they leave or change roles to impact a wide range of non-human identities, digital credentials, and other secrets. Those secrets includ… Continue reading The NHI management challenge: When employees leave

Investing in Privacy by Design for long-term compliance

In this Help Net Security interview, Bojan Belušić, Head of Information Security & IT Operations at Microblink, discusses the relationship between Privacy by Design and regulatory frameworks like GDPR. Integrating privacy principles from the outse… Continue reading Investing in Privacy by Design for long-term compliance

Balancing legal frameworks and enterprise security governance

In this Help Net Security interview, Tom McAndrew, CEO at Coalfire, discusses the balance organizations must strike between legal compliance and effective enterprise security governance in the context of evolving regulatory frameworks. McAndrew also ad… Continue reading Balancing legal frameworks and enterprise security governance

How cyber compliance helps minimize the risk of ransomware infections

Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses. To help businesses combat ransomware and other threats, va… Continue reading How cyber compliance helps minimize the risk of ransomware infections

Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense

In this Help Net Security, Erica Banks, VP and a leader in Booz Allen’s civilian services business, discusses the Federal Cybersecurity Strategy’s role in safeguarding national assets. Banks outlines key areas for improvement, including funding, talent… Continue reading Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense

Scaling data security solutions: What you need to know

In this Help Net Security interview, Bruno Kurtic, President and CEO at Bedrock Security, discusses the role of data visibility in enhancing cybersecurity. He explains that effective data visibility involves discovering, classifying, and contextualizin… Continue reading Scaling data security solutions: What you need to know

How to design a third-party risk management framework

Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such as third-party networks, which can be used by hackers to attack an organization. Through a strong TPRM framew… Continue reading How to design a third-party risk management framework

Strengthening cybersecurity preparedness with defense in depth

In this Help Net Security interview, Chaim Mazal, Chief Security Officer at Gigamon, discusses cybersecurity preparedness measures for businesses, the impact of international inconsistencies on global operations, and the board’s role in cybersecu… Continue reading Strengthening cybersecurity preparedness with defense in depth