compliance
![third party](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31195646/third-party2-400x200.webp)
How to design a third-party risk management framework
Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such as third-party networks, which …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26142115/compliance-400x200.jpg)
Top priorities for compliance leaders this year
Legal, compliance and privacy leaders list strengthening their personal impact on company strategy as their top priority for 2024, according to Gartner. Improving third party …
![Chaim Mazal](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24120927/chaim_mazal-2-gigamon-400x200.webp)
Strengthening cybersecurity preparedness with defense in depth
In this Help Net Security interview, Chaim Mazal, Chief Security Officer at Gigamon, discusses cybersecurity preparedness measures for businesses, the impact of international …
![microsoft cybersecurity dilemma](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07153226/microsoft_cybersecurity_dilemma-400x200.webp)
Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella
Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with …
![shadow egineering](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07133258/shadow_egineering-400x200.webp)
Shadow engineering exposed: Addressing the risks of unauthorized engineering practices
Shadow engineering is present in many organizations, and it can lead to security, compliance, and risk challenges. In this Help Net Security video, Darren Meyer, Staff …
![Mike Toole](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21125108/mike_toole-2-blumira-400x200.webp)
4 key steps to building an incident response plan
In this Help Net Security interview, Mike Toole, head of security and IT at Blumira, discusses the components of an effective security incident response strategy and how they …
![Swissbit iShield Key Pro](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/27084255/swissbit-ishield_key_pro-1500-400x200.webp)
Product showcase: Protect digital identities with Swissbit’s iShield Key Pro
In today’s fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/24144150/usa-flag-1-400x200.jpg)
Pressure mounts on CISOs as SEC bares teeth with legal action
A Panaseer investigation into organizations’ annual 10-K filings reported to the SEC shows that from January-May 2024, at least 1,327 filings mentioned NIST – a key indicator …
![Julianna Lamb](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/12095639/julianna_lamb-2-stytch-400x200.webp)
From passwords to passkeys: Enhancing security and user satisfaction
In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and …
![map](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17112636/map-400x200.webp)
How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams
Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like Google Maps …
![Alan Dekok](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/07131822/alan_dekok-2-networkradius-400x200.webp)
Enhancing security through collaboration with the open-source community
In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the …
![Mark Nelsen](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/05124651/mark_nelsen-2-visa-400x200.webp)
How businesses can integrate token technology into existing payment systems
In this Help Net Security interview, Mark Nelsen, SVP and Global Head of Consumer Product at Visa, discusses the integration of token technology into existing payment systems. …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders