Vulnerability disclosure: Legal risks and ethical considerations for researchers

In this Help Net Security interview, Eddie Zhang, Principal Consultant at Project Black, explores the complex and often controversial world of vulnerability disclosure in cybersecurity. Zhang explores the intricate balancing act that researchers must p… Continue reading Vulnerability disclosure: Legal risks and ethical considerations for researchers

NIS2 and its global ramifications

The Network and Information Systems Directive (NIS2), due to come into effect in October 2024, seeks to improve cyber resilience in the European Union (EU). Its effects are likely to be wider reaching, though, bringing in more stringent processes and c… Continue reading NIS2 and its global ramifications

Smaller businesses embrace GenAI, overlook security measures

Organizations are feeling the pressure to rush into generative AI (GenAI) tool usage, despite significant security concerns, according to Zscaler. More than 900 global IT decision makers, although 89% of organizations consider GenAI tools like ChatGPT … Continue reading Smaller businesses embrace GenAI, overlook security measures

Collaborative strategies are key to enhanced ICS security

In this Help Net Security interview, Marko Gulan, Cyber Security Consultant at Schneider Electric, discusses the complexities of safeguarding industrial control systems (ICS). Our conversation will explore the importance of cross-departmental collabora… Continue reading Collaborative strategies are key to enhanced ICS security

Rethinking cyber risk: The case against spreadsheets

In this Help Net Security video, Christina Hoefer, VP of Global Industrial Enterprise at Forescout, discusses why it is time for manufacturers/OT security leaders to “toss the spreadsheet” regarding their traditional methods of tracking data for cyber … Continue reading Rethinking cyber risk: The case against spreadsheets

Virtual credit card fraud: An old scam reinvented

In today’s rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This […]

The post Virtual credit card fraud: An old scam reinvented appeared first on Security Intelligence.

Continue reading Virtual credit card fraud: An old scam reinvented

Navigating OT/IT convergence and securing ICS environments

Escalating threats to operational technology (OT) have prompted an increasing number of global enterprises to adopt sophisticated technologies and services to enhance the security of their assets. In this Help Net Security video, Christopher Warner, Se… Continue reading Navigating OT/IT convergence and securing ICS environments

The real impact of the cybersecurity poverty line on small organizations

The financial constraints many smaller organizations face often cast shadows on their ability to fortify defenses. In this Help Net Security interview, Brent Deterding, CISO at Afni, delves into the realities and myths surrounding the cybersecurity pov… Continue reading The real impact of the cybersecurity poverty line on small organizations

Unmasking the limitations of yearly penetration tests

In this Help Net Security interview, Charles d’Hondt, Head of Operations, Ambionics Security, talks about the necessity of implementing continuous penetration testing because yearly ones are not enough. They leave blind spots and cannot match the… Continue reading Unmasking the limitations of yearly penetration tests

Tackling cyber risks head-on using security questionnaires

In this Help Net Security interview, Gaspard de Lacroix-Vaubois, CEO at Skypher, talks about the implementation of security questionnaires and how they facilitate assessments and accountability across all participants in the technology supply chain, fo… Continue reading Tackling cyber risks head-on using security questionnaires