![Oded Hareven](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/19114849/oded_hareven_2-akeyless-400x200.jpg)
The importance of securing machine-to-machine and human-to-machine interaction
In this interview with Help Net Security, Oded Hareven, CEO at Akeyless, explains how organizations manage secrets, particularly how this practice has changed and evolved amid …
![Magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194145/magnify-400x200.jpg)
The evolution of security analytics
As networks continue to evolve and security threats get more complex, security analytics plays an increasingly critical role in securing the enterprise. By combining software, …
![David Mahdi](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/17094451/david_mahdi_2-sectigo-400x200.jpg)
When protecting and managing digital identities, orchestration and automation are critical
In this interview with Help Net Security, David Mahdi, CSO of Sectigo, talks about the importance of digital identity management, the issues organizations have with digital …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092943/aid2-400x200.jpg)
Cultivating a security-first mindset for software developers
There is a “great cyber security awakening” happening across companies. Right now, we need a fundamental new approach to development, so we are not constantly firefighting. …
![Sophie Stalla-Bourdillon2](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/19084237/sophie_stalla_bourdillon_19-immuta-400x200.jpg)
Is cloud the solution to optimized data privacy?
In this interview with Help Net Security, Sophie Stalla-Bourdillon, Senior Privacy Counsel and Legal Engineer at Immuta, talks about data privacy, what organizations can a …
![online shopping](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102510/online_shopping-400x200.jpg)
How Buy Now, Pay Later is being targeted by fraudsters
Consumers are increasingly utilising Buy Now Pay Later (BNPL) payment options to make online purchases. Indeed, several e-commerce companies reported huge uptakes in sales, …
![Scott Laliberte](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/14090306/scott_laliberte_2_protiviti-400x200.jpg)
AI and ML implementation in cybersecurity programs pushes for a change in people’s mindset
In this interview with Help Net Security, Scott Laliberte, Managing Director at Protiviti, talks about the implementation of AI and ML in cybersecurity programs, why this is a …
![check](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094507/check-400x200.jpg)
IR and SimEx: Can and should they be standardized?
The National Cyber Security Centre (NCSC) intends to launch a new assurance scheme for incident response (IR) and simulated exercises (SimEx) in Q2 2022, which could become a …
![Matthew Rosenquist](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/12111206/matthew_rosenquist_2-eclipz-400x200.jpg)
AI to bring massive benefits, but also cause great concern
In this interview with Help Net Security, Matthew Rosenquist, CISO at Eclipz.io, explains the benefits as well as the disadvantages of AI, and the tremendous impact it could …
![Curtis Fechner](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/12104713/curtis_fechner_2-optiv-400x200.jpg)
How to improve your IR tabletop exercises and why you really should?
In this interview with Help Net Security, Curtis Fechner, engineering fellow at Optiv Security, explains the function of incident response tabletop exercises and how they can …
![check](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094509/check2-400x200.jpg)
The future of security protocols for remote work
Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19093544/fighter-brain-tech-400x200.jpg)
In 2022, AI-based full-suite security is needed
In 2021, ransomware became dinner table conversation. Not only were cybersecurity leaders focused on the ransomware pandemic, but also the general population learned the …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?