Katie Boswell on AI security and women’s rise in cybersecurity

Katie Boswell spent years on the front lines securing the most critical national infrastructure in energy and life sciences. Yet, earlier in her career, she was told that senior leadership was not for her if she planned on becoming a mother. Despite ea… Continue reading Katie Boswell on AI security and women’s rise in cybersecurity

How defense contractors can move from cybersecurity to cyber resilience

As the world’s most powerful military and economic power, the United States also holds another, less impressive distinction: Cyber threat actors target the US more than any other country in the world. In 2022 alone, the FBI received more than 800,000 c… Continue reading How defense contractors can move from cybersecurity to cyber resilience

Introducing the book: Cybersecurity First Principles

In this Help Net Security video interview, Rick Howard, CSO of N2K, Chief Analyst, and Senior Fellow at the Cyberwire, discusses his book – Cybersecurity First Principles: A Reboot of Strategy and Tactics. In the book, Howard challenges the conve… Continue reading Introducing the book: Cybersecurity First Principles

Disaster recovery challenges enterprise CISOs face

An essential aspect of organizational operations is effectively responding to and returning from a disruptive event, commonly called disaster recovery. The primary objective of DR techniques is to restore the utilization of crucial systems and IT infra… Continue reading Disaster recovery challenges enterprise CISOs face

Fighting ransomware: Perspectives from cybersecurity professionals

Ransomware has become an ever-present threat to individuals, businesses, and even entire nations. In this Help Net Security round-up, we present parts of previously recorded videos from experts in the field that shed light on the pressing ransomware is… Continue reading Fighting ransomware: Perspectives from cybersecurity professionals

The root causes of API incidents and data breaches

API calls make up the majority of our digital lives. Take, for example, the everyday use of a cloud-based food delivery app, which could involve up to 25 API calls. Between the order being placed, transmission to the restaurant, the coordination of del… Continue reading The root causes of API incidents and data breaches

CISO-approved strategies for software supply chain security

Integrating proprietary and open-source code, APIs, user interfaces, application behavior, and deployment workflows creates an intricate composition in modern applications. Any vulnerabilities within this software supply chain can jeopardize your and y… Continue reading CISO-approved strategies for software supply chain security

Strengthening travel safety protocols with ISO 31030

In this Help Net Security video, Tracy Reinhold, Chief Security Officer at Everbridge, talks about ISO 31030, the officially recognized International Standard for travel risk management, guiding how to manage risks to organizations and travelers. The g… Continue reading Strengthening travel safety protocols with ISO 31030

How smart bots are infecting and exploiting the internet

According to Imperva, bad bot traffic grew to 30.2%, a 2.5% increase over 2021. In this Help Net Security video, Lynn Marks, Senior Product Manager at Imperva, discusses malicious bot activity. This is a substantial threat for businesses, leading to po… Continue reading How smart bots are infecting and exploiting the internet