![Alon Gal](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18132643/alon_gal-2-hudsonrock-400x200.jpg)
Prioritizing cybercrime intelligence for effective decision-making in cybersecurity
In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will …
![Amber Schroader](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18130930/amber_schroader-2-paraben_corporation-400x200.jpg)
Emerging trends and strategies in digital forensics
In this Help Net Security interview, Amber Schroader, CEO at Paraben Corporation, discusses the challenges posed by the complexity of modern computer systems and networks on …
![Nate Warfield](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18122458/nate_warfield-2-eclypsium-400x200.jpg)
CISOs’ role in identifying tech components and managing supply chains
In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12091424/vulnerability-broken-400x200.jpg)
The effect of omission bias on vulnerability management
Whether we’d like to admit it to ourselves or not, all humans harbor subconscious biases that powerfully influence our behavior. One of these is the omission bias, which has …
![Randy Marchany](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17140152/randy_marchany-2-virginia_tech-400x200.jpg)
Prioritizing CIS Controls for effective cybersecurity across organizations
In this Help Net Security interview, Randy Marchany, CISO at Virginia Tech, discusses the challenges and strategies associated with implementing CIS Controls in organizations …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07115823/locks-red-400x200.jpg)
Why cyberattacks mustn’t be kept secret
No company is immune to cyberattacks, but when the inevitable happens, too many companies still try to maintain a wall of silence. In fact, over half of security professionals …
![Jean-Philippe Aumasson](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17140145/jean_philippe_aumasson-2-taurus-400x200.jpg)
Beyond blockchain: Strategies for seamless digital asset integration
In this Help Net Security interview, Jean-Philippe Aumasson, CSO at Taurus, emphasizes the often-overlooked complexities of key generation, storage, and distribution, …
![Securities and Exchange Commission](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/31085518/sec2-400x200.jpg)
Without clear guidance, SEC’s new rule on incident reporting may be detrimental
The SEC has instituted a set of guidelines “requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material …
![Ivan Reedman](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/11115622/ivan_reedman-2-ioactive-400x200.jpg)
The reality of hacking threats in connected car systems
With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07131850/lock-texture-400x200.jpg)
Out with the old and in with the improved: MFA needs a revamp
From AI to ZTA (zero-trust architecture), the technology responsible for protecting your company’s data has evolved immensely. Despite the advances, cybercriminals repeatedly …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29120358/encryption-1400-400x200.jpg)
Attribute-based encryption could spell the end of data compromise
The future of data privacy is the end of compromise. With the world producing data at astounding rates, we need ways to put data to the best use while protecting against …
![Tim Morris](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/11103343/tim_morris-2-tanium-400x200.jpg)
Ransomware negotiation: When cybersecurity meets crisis management
In this Help Net Security interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD