Google Protected Computing: Ensuring privacy and safety of data regardless of location

In this Help Net Security interview, Royal Hansen, VP of Engineering for Privacy, Safety, and Security at Google, talks about Protected Computing, the impact of data protection regulations, and privacy in general. Data protection regulations are rapidl… Continue reading Google Protected Computing: Ensuring privacy and safety of data regardless of location

ChatGPT is bringing advancements and challenges for cybersecurity

Understanding why ChatGPT is garnering so much attention takes a bit of background. Up until recently, AI models have been quite “dumb”: they could only respond to specific tasks when trained on a large dataset providing context on what to find. But, o… Continue reading ChatGPT is bringing advancements and challenges for cybersecurity

How advancing cyber education can help fill workforce gaps

The ongoing cybersecurity skills shortage is a critical issue plaguing organizations and causing serious problems. The lack of trained and qualified professionals in the field has resulted in numerous security breaches, leading to the loss of large amo… Continue reading How advancing cyber education can help fill workforce gaps

Four steps SMBs can take to close SaaS security gaps

Despite economic volatility and tighter budgets, adoption of software as a service (SaaS) continues to increase. Gartner forecasts a 16.8% growth for SaaS in 2023 as companies – including SMBs – add new SaaS platforms to their IT stack. Thi… Continue reading Four steps SMBs can take to close SaaS security gaps

Navigating the ever-changing landscape of digital security solutions

Recently, Entrust named Bhagwat Swaroop as President, Digital Security Solutions. In this role, Bhagwat will lead the evolution, growth, and expansion of the Entrust Digital Security portfolio, which includes solutions for data encryption, public and p… Continue reading Navigating the ever-changing landscape of digital security solutions

Application and cloud security is a shared responsibility

Cloud environments and application connectivity have become a critical part of many organizations’ digital transformation initiatives. In fact, nearly 40% of North American and European-based enterprises adopted industry-specific cloud platforms in 202… Continue reading Application and cloud security is a shared responsibility

Attack surface management (ASM) is not limited to the surface

Another year of high-profile cyberattacks, another year of beating the cybersecurity drums. Clearly, we’re missing a few notes. Attack surface management (ASM) is a make or break for organizations, but before we get to the usual list of best practices,… Continue reading Attack surface management (ASM) is not limited to the surface

The risks and benefits of starting a vCISO practice

There is a definite trend of MSPs shifting into security. There are a number of very good reasons for this, including the fact that other services traditionally offered are becoming commoditized, as well as the increasing threat that SMEs and SMBs are … Continue reading The risks and benefits of starting a vCISO practice

Steps CISA should take in 2023

Recently, I was asked to imagine that I had been granted an hour with top officials at the Cybersecurity and Infrastructure Security Agency (CISA) – what advice would I offer to help it have an even bigger impact in 2023 and beyond? It was only i… Continue reading Steps CISA should take in 2023

Get hired in cybersecurity: Expert tips for job seekers

The dire shortage of information security experts has left organizations struggling to keep up with the growing demand for their skills. Still, getting a job in cybersecurity tends to take time and effort. In this Help Net Security interview, Joseph Co… Continue reading Get hired in cybersecurity: Expert tips for job seekers