Strengthening the weakest links in the digital supply chain

In this Help Net Security video, Marc Gaffan, CEO at IONIX, discusses how businesses’ biggest cybersecurity mistake is not protecting the full external attack surface that continues to expand to include a businesses’ entire digital supply chain. … Continue reading Strengthening the weakest links in the digital supply chain

Using AI/ML to optimize your tech stack and enhance business efficiency

In this Help Net Security interview, Arthur Hu, SVP, Global CIO and Services & Solutions Group CTO at Lenovo, discusses how AI/ML is optimizing tech stacks, the hurdles anticipated in its integration, the role of AI in enterprise resilience and ag… Continue reading Using AI/ML to optimize your tech stack and enhance business efficiency

What to do (and what not to do) after a data breach

Data breaches have been hitting the headlines left and right. Every time a breach occurs, the impacted organization’s response differs from the last. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead at Skyhigh Security, disc… Continue reading What to do (and what not to do) after a data breach

CISOs under pressure: Protecting sensitive information in the age of high employee turnover

In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks about how zero trust principles, identity access management, and managed sec… Continue reading CISOs under pressure: Protecting sensitive information in the age of high employee turnover

Cybersecurity best practices while working in the summer

IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy Ventura, Director, Security Strategy & Field CISO at ThreatX, discusses how emp… Continue reading Cybersecurity best practices while working in the summer

Micropatches: What they are and how they work

In this Help Net Security video, Mitja Kolsek, CEO at Acros Security, discusses micropatches, a solution to a huge security problem. With micropatches, there are no reboots or downtime when patching and no fear that an official update will break produc… Continue reading Micropatches: What they are and how they work

Preparing health systems for cyber risks and insurance coverage

Our healthcare systems are at risk of infiltration by threat actors, potentially disrupting services, compromising sensitive data, and even jeopardizing patient outcomes. Among the people addressing these challenges is Dennis Fridrich, VP of Cybersecur… Continue reading Preparing health systems for cyber risks and insurance coverage

The magic formula for big data companies to outshine the competition

In today’s data-driven world, organizations that can harness the power of big data and derive actionable insights are positioned to succeed. However, the sheer number of big data companies vying for attention has made it crucial for entrepreneurs to di… Continue reading The magic formula for big data companies to outshine the competition