![Patrice Auffret](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/23112810/patrice_auffret-2-onyphe-400x200.jpg)
What makes a good ASM solution stand out
In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that …
![database](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151902/database-400x200.jpg)
Is the cybersecurity community’s obsession with compliance counter-productive?
Does anyone think the chances of surviving a plane crash increase if our tray tables are locked and our carry-on bags are completely stowed under our seats? That we’ll be OK …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093146/robot-400x200.jpg)
Uncovering a privacy-preserving approach to machine learning
In the era of data-driven decision making, businesses are harnessing the power of machine learning (ML) to unlock valuable insights, gain operational efficiencies, and …
![Florian Forster](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131036/florian_forster-2-zitadel-400x200.jpg)
Adapting authentication to a cloud-centric landscape
In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/24130337/cyber_insurance-1-400x200.jpg)
Cybersecurity insurance is missing the risk
Cybersecurity insurance is a rapidly growing market, swelling from approximately $13B in 2022 to an estimated $84B in 2030 (26% CAGR), but insurers are struggling with …
![Jonathan Segev](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131051/jonathan_segev-2-ieee-400x200.jpg)
IEEE 802.11az provides security enhancements, solves longstanding problems
In this Help Net Security interview, Jonathan Segev, IEEE 802.11 Task Group (TG) Chair of next-generation positioning (TGaz) at IEEE, discusses IEEE 802.11az. The new standard …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133912/ai-security-400x200.jpg)
Does a secure coding training platform really work?
As security vulnerabilities are reported to you time and again, you may ask yourself: “Why don’t these developers learn the lesson?” The next thing you may think is: “We …
![Gerwin van der Lugt](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/17102549/gerwin_van_der_lugt-2-oddity_ai-400x200.jpg)
AI and the evolution of surveillance systems
In this Help Net Security interview, Gerwin van der Lugt, CTO at Oddity, discusses the future of surveillance and AI’s influence. He also delves into how organizations …
![Roland Atoui](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131101/roland_atoui-2-red_alert_labs-400x200.jpg)
Anticipating the next wave of IoT cybersecurity challenges
In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07131850/lock-texture-400x200.jpg)
IT’s rising role in physical security technology
As the adoption of cloud-based and mobile-access security systems continues to increase among both new and established businesses, the lines between traditional physical …
![Kennedy Torkura](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131056/kennedy_torkura-2-mitigant-400x200.jpg)
Maintaining consistent security in diverse cloud infrastructures
As cloud infrastructures become increasingly API-driven and dynamically spread across expansive attack surfaces, achieving clarity proves difficult. Compounding this challenge …
![law](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/29115411/tekz6666_justice_law_computer_keyboard_343e48d3-44fb-4ffc-911f-2ce012d904ec-400x200.jpg)
How EU lawmakers can make mandatory vulnerability disclosure responsible
There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability: The organization works quickly to fix the …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)