Please turn on your JavaScript for this page to function normally.
cybersecurity regulations
Ambitious cybersecurity regulations leave companies in compliance chaos

While the goal of cybersecurity regulations is to bring order among organizations and ensure they take security and risks seriously, the growing number of regulations has also …

Alex Freedland
Strategies for CISOs navigating hybrid and multi-cloud security

In this Help Net Security interview, Alex Freedland, CEO at Mirantis, discusses the cloud security challenges that CISOs need to tackle as multi-cloud and hybrid environments …

Miguel Guevara
Google on scaling differential privacy across nearly three billion devices

In this Help Net Security interview, Miguel Guevara, Product Manager, Privacy Safety and Security at Google, discusses the complexities involved in scaling differential …

problem
99% of CISOs work extra hours every week

The most common challenge for CISOs is resource constraints: not enough staff, budget or technology to support the security program needed or meet compliance requirements, …

Effective strategies for measuring and testing cyber resilience

In this Help Net Security interview, Detective Superintendent Ian Kirby, CEO of the National Cyber Resilience Centre Group (NCRCG), discusses the emerging cyber threats and …

CISO
Should the CISOs role be split into two functions?

84% of CISOs believe the role needs to be split into two functions – one technical and one business-focused, to maximize security and organizational resilience, …

CISO
Despite massive security spending, 44% of CISOs fail to detect breaches

Despite global information security spending projected to reach $215 billion in 2024, 44% of CISOs surveyed reported they were unable to detect a data breach in the last 12 …

Mick Baccio
How NIS2 will impact sectors from healthcare to energy

In this Help Net Security interview, Mick Baccio, Global Security Advisor at Splunk SURGe, discusses the far-reaching implications of the NIS2 Directive beyond traditional IT …

Rickard Carlsson
CISOs’ strategies for managing a growing attack surface

In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital …

Vulnerability
The case for enterprise exposure management

For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to …

Sanaz Yashar
Best practices for implementing threat exposure management, reducing cyber risk exposure

In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional …

botnet
What bots mean for businesses and consumers

Simple bots have existed since the early to mid-2000s when organizations had no means to protect themselves or their website’s users from them. Yet today, despite having tools …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools