![Marc Castejon](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/29052421/marc_castejon-2-silent_breach-400x200.jpg)
Understanding your attack surface is key to recognizing what you are defending
In this interview with Help Net Security, Marc Castejon, CEO at Silent Breach, discusses what organizations should be worried about at the moment, and what technologies they …
![If It's Smart, It's Vulnerable book](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/29082305/mikko-book-smart-vulnerable-400x200.jpg)
Introducing the book: If It’s Smart, It’s Vulnerable
All our devices and gadgets are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping …
![threat intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103147/threat_intelligence-400x200.jpg)
Risk astute leadership: Converting intelligence into actionable controls
In this Help Net Security video, John deCraen, Associate Managing Director at Kroll, talks about risk astute leadership and the leveraging of threat intelligence to inform …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
6 ways your cloud data security policies are slowing innovation – and how to avoid that
As practically every organization shifts from managing their data in network-based data centers to storing it in the cloud, cloud data security policies are created to secure …
![Christopher Sestito](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/20110155/christopher_sestito-2-hidden_layer-400x200.jpg)
Machine learning creates a new attack surface requiring specialized defenses
Machine learning (ML) inputs and outputs are becoming more widely available to customers thanks to organizations in almost every sector integrating artificial intelligence …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094319/idea-400x200.jpg)
How to minimize your exposure to supply chain attacks
Supply chain attacks are on the rise, and many organizations seem unsure on how to respond to the threat, but I’m here to tell you that there are several steps you can take to …
![Richard Stiennon](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/21124111/richard_stiennon-2-it_harvest-400x200.jpg)
The infosec investment landscape: Which tech gets the most bucks?
How many cybersecurity vendors are active at the moment? What are they offering? How is their business doing? These are just some of the questions that Richard Stiennon, Chief …
![PAM solution](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/26143313/pam-solution-400x200.jpg)
Benefits of modern PAM: Efficiency, security, compliance
Many legacy Privileged Access Management (PAM) solutions are still very manual regarding what they do and how they manage user access and permissions. They are geared toward …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/22135014/user-3d-400x200.jpg)
Why firms need to harness identity management before it spirals into an identity crisis
Digital transformation is at the top of every organization’s agenda today. But while it is easy to make bold, forward-looking plans on paper, the reality of implementing …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/17123432/iot-hns-400x200.jpg)
How kitemarks are kicking off IoT regulation
Regulation of the Internet of Things (IoT) has always been a contentious subject. Those against claim it stymies growth of a nascent industry, while those advocating for it …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102947/password-400x200.jpg)
The importance of secure passwords can’t be emphasized enough
Cybercriminals typically rely on weak passwords to break into online accounts of unsuspecting victims, which often leads to severe consequences. But despite understanding the …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
Removing the blind spots that allow lateral movement
There are critical blind spots in most security solutions today that make it nearly impossible to detect and prevent lateral movement attacks. Understanding the fundamentals …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints