CISO-level tips for securing corporate data in the cloud

The presence of each third-party application increases the potential for attacks, particularly when end users install them without proper oversight or approval. IT security teams face challenges in obtaining comprehensive knowledge about the apps conne… Continue reading CISO-level tips for securing corporate data in the cloud

CISO-level tips for securing corporate data in the cloud

The presence of each third-party application increases the potential for attacks, particularly when end users install them without proper oversight or approval. IT security teams face challenges in obtaining comprehensive knowledge about the apps conne… Continue reading CISO-level tips for securing corporate data in the cloud

CISO-level tips for securing corporate data in the cloud

The presence of each third-party application increases the potential for attacks, particularly when end users install them without proper oversight or approval. IT security teams face challenges in obtaining comprehensive knowledge about the apps conne… Continue reading CISO-level tips for securing corporate data in the cloud

Gap between OT security assumptions and reality

In the fast-evolving landscape of technology and connectivity, ensuring the security of operational technology (OT) systems has become a paramount concern for organizations worldwide. In this Help Net Security video, Daniel Bren, CEO at OTORIO, discuss… Continue reading Gap between OT security assumptions and reality

How continuous security monitoring is changing the compliance game

Managing compliance doesn’t have to be draining, time-consuming, or overly complicated. In this Help Net Security video, Wesley Van Zyl, Senior Manager, Compliance Success at Scytale, discusses how keeping track of all your security controls can … Continue reading How continuous security monitoring is changing the compliance game

What flying a plane can teach you about cybersecurity

Before taking on the role as GM of IAI’s cyber division, Esti Peshin was a member of Israel’s parliament, wielding both legislation and regulation to strengthen the country’s renowned high-tech ecosystem. Despite her commitments, Esti shared with the L… Continue reading What flying a plane can teach you about cybersecurity

Enhancing open source security: Insights from the OpenSSF on addressing key challenges

In this Help Net Security interview, we meet a prominent industry leader. Brian Behlendorf, CTO at the Open Source Security Foundation (OpenSSF), shares insights on the influence of his experiences with the White House CTO office, World Economic Forum,… Continue reading Enhancing open source security: Insights from the OpenSSF on addressing key challenges

Preparing for federal supply chain security standardization

In 2021, the Biden Administration published the Executive Order on Improving the Nation’s Cybersecurity (EO 14028), setting off an agency-wide security initiative with the ultimate objective of standardizing security requirements across the Department … Continue reading Preparing for federal supply chain security standardization

3 tips to accelerate zero trust adoption

Zero trust adoption is beginning to accelerate as networks get more complex. Gartner predicts that by 2026, 10% of large enterprises will have a comprehensive, mature, and measurable zero-trust program in place (compared to just 1% today). But adoption… Continue reading 3 tips to accelerate zero trust adoption

SquareX’s vision: A future where internet security is a non-issue

With an ever-evolving landscape of cyber threats, the necessity for innovative, effective, and user-friendly security products has never been more apparent. Current security solutions, however, seem to lag behind, struggling to adequately address the c… Continue reading SquareX’s vision: A future where internet security is a non-issue