Wargaming an effective data breach playbook

A well-tuned data breach playbook can provide security teams with a clear roadmap for working through the breach response process. Foreseeing every possible twist and turn of a breach may be impossible, but through extensive wargaming, teams can simula… Continue reading Wargaming an effective data breach playbook

Implementing a zero-trust system that uses workload identity across a service mesh in Kubernetes

In this Help Net Security video, Michael Peters, Principal Software Engineer at Red Hat, discusses how to implement a zero-trust system that uses workload identity across a service mesh in Kubernetes to provide explicit authorization between services, … Continue reading Implementing a zero-trust system that uses workload identity across a service mesh in Kubernetes

Balancing cybersecurity with business priorities: Advice for Boards

In today’s rapidly evolving technological landscape, it’s more important than ever for Boards and executives to stay informed about the latest advancements and potential risks in technology and digital capability. In this Help Net Security … Continue reading Balancing cybersecurity with business priorities: Advice for Boards

Economic uncertainty drives upskilling as a key strategy for organizations

With the economy experiencing instability and decline, organizations rely on their technology experts to maintain their innovative edge and generate business value. Despite being instructed to reduce expenses by 65% of the technology team leaders, 72% … Continue reading Economic uncertainty drives upskilling as a key strategy for organizations

Key factors driving changes in the perception of the CISO role

The CISO role is currently fraught with novel challenges and escalating workloads. This includes increased paperwork and time spent on risk assessments, which have surged from two to thirty hours per assessment. Furthermore, privacy regulations are exp… Continue reading Key factors driving changes in the perception of the CISO role

Data-backed insights for future-proof cybersecurity strategies

The Qualys Threat Research Unit (TRU) has been hard at work detecting vulnerabilities worldwide, and its latest report is set to shake up the industry. In this Help Net Security interview, Travis Smith, VP of the Qualys TRU, talks about the 2023 Qualys… Continue reading Data-backed insights for future-proof cybersecurity strategies

Making risk-based decisions in a rapidly changing cyber climate

Nicole Darden Ford is Global VP & CISO at Rockwell Automation. As the company’s cybersecurity leader, Nicole is entrusted to protect enterprise IT assets with scalable, future-ready platforms that enable the business. In addition to building cyber… Continue reading Making risk-based decisions in a rapidly changing cyber climate

How AI is transforming cybersecurity for better and worse

Many sectors view AI and machine learning with mixed emotions, but for the cybersecurity industry, they present a double-edged sword. On the one hand, AI provides powerful tools for cybersecurity professionals, such as automated security processing and… Continue reading How AI is transforming cybersecurity for better and worse

Streamlining cybersecurity decision-making for analysts and CISOs

Using structured, machine-readable data in defensive systems can present a significant challenge. In this Help Net Security interview, Giorgos Georgopoulos, CEO at Elemendar, discusses these challenges and how Elemendar’s application can help cyb… Continue reading Streamlining cybersecurity decision-making for analysts and CISOs

Rookout’s Snapshots: The fourth pillar of observability for more secure applications

Liran Haimovitch, CTO and co-founder of Rookout, with his extensive background in cybersecurity within the Israeli government, has a unique perspective on the importance of security and its impact on businesses. In this Help Net Security interview, we&… Continue reading Rookout’s Snapshots: The fourth pillar of observability for more secure applications