Evolving uses of tokenization to protect data

Tokenization replaces sensitive data, such as credit card numbers or personal identifiers, with unique, non-sensitive tokens with no exploitable value. This method helps protect sensitive information by ensuring that the actual data is never stored or … Continue reading Evolving uses of tokenization to protect data

Aim for crypto-agility, prepare for the long haul

While organizations have long experimented with various facets of digital transformation, the journey toward crypto-agility is one of the most significant technological transitions of our time. Success in the emerging quantum era will require technical… Continue reading Aim for crypto-agility, prepare for the long haul

Addressing the intersection of cyber and physical security threats

In this Help Net Security, Nicholas Jackson, Director of Cyber Operations at Bitdefender, discusses how technologies like AI, quantum computing, and IoT are reshaping cybersecurity. He shares his perspective on the new threats these advancements bring … Continue reading Addressing the intersection of cyber and physical security threats

A humble proposal: The InfoSec CIA triad should be expanded

The inconsistent and incomplete definitions of essential properties in information security create confusion within the InfoSec community, gaps in security controls, and may elevate the costs of incidents. In this article, I will analyze the CIA triad,… Continue reading A humble proposal: The InfoSec CIA triad should be expanded

eBay CISO on managing long-term cybersecurity planning and ROI

In this Help Net Security interview, Sean Embry, CISO at eBay, discusses key aspects of cybersecurity leadership. He shares insights on balancing long-term strategic planning with immediate threat response, evaluating the ROI of new technologies, and a… Continue reading eBay CISO on managing long-term cybersecurity planning and ROI

eBay CISO on managing long-term cybersecurity planning and ROI

In this Help Net Security interview, Sean Embry, CISO at eBay, discusses key aspects of cybersecurity leadership. He shares insights on balancing long-term strategic planning with immediate threat response, evaluating the ROI of new technologies, and a… Continue reading eBay CISO on managing long-term cybersecurity planning and ROI

Why cybersecurity is critical to energy modernization

In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresses … Continue reading Why cybersecurity is critical to energy modernization

Enhancing visibility for better security in multi-cloud and hybrid environments

In this Help Net Security interview, Brooke Motta, CEO of RAD Security, talks about how cloud-specific threats have evolved and what companies should be watching out for. She discusses the growing complexity of cloud environments and the importance of … Continue reading Enhancing visibility for better security in multi-cloud and hybrid environments