regulation
![DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/26143802/devops-1400-2024-400x200.jpg)
Key areas that will define the intersection of AI and DevOps
Eficode research indicates that 96% of developers use AI tools, with most coders bypassing security policies to use them. With no standardized AI tool regulations, researchers …
![NIST CSF 2.0](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27104454/nist-csf-2-compressed-400x200.webp)
NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure
The National Institute of Standards and Technology (NIST) has updated its widely utilized Cybersecurity Framework (CSF), a key document for mitigating cybersecurity risks. The …
![cybersecurity regulations](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/02145135/cybersecurity_regulations-1400-400x200.jpg)
Escalating cyber threats spark demand for stronger regulations
As the frequency and sophistication of cyber threats continue to escalate, the need for robust cybersecurity regulations has never been more critical. In this Help Net …
![robocall](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09130748/robocall-robot-400x200.jpg)
AI-generated voices in robocalls now illegal
The FCC has revealed the unanimous adoption of a Declaratory Ruling that recognizes calls made with AI-generated voices are “artificial” under the Telephone Consumer …
![Robin Long](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/06115347/robin_long-2-kiowa_security-400x200.jpg)
Key strategies for ISO 27001 compliance adoption
In this Help Net Security interview, Robin Long, founder of Kiowa Security, shares insights on how best to approach the implementation of the ISO/IEC 27001 information …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28085702/privacy-400x200.jpg)
How companies are misjudging their data privacy preparedness
In this Help Net Security video, Karen Schuler, Global Privacy & Data Protection Chair at BDO, discusses overconfidence in data privacy and data protection practices. …
![Anya Shpilman](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/31122017/anya_shpilman-2-wdigital-400x200.jpg)
Choosing the right partner when outsourcing cybersecurity
In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential risks of outsourcing …
![Roland Palmer](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18120415/roland_palmer-2-sumo_logic-400x200.jpg)
NIS2 Directive raises stakes for security leaders
In this Help Net Security interview, Roland Palmer, VP Global Operations Center at Sumo Logic, discusses key challenges and innovations of the NIS2 Directive, aiming to …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/01101255/compliance1-400x200.jpg)
Essential questions for developing effective human rights policies
Growing environmental, social, and governance (ESG) expectations and expanding global regulation are propelling organizations to consider implementing a stand-alone human …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11133113/privacy-400x200.jpg)
Budget cuts loom for data privacy initiatives
The past year saw developments and updates to privacy regulations across the globe—from India’s Personal Data Protection Bill to Brazil’s General Data Protection Law, …
![Nate Warfield](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18122458/nate_warfield-2-eclypsium-400x200.jpg)
CISOs’ role in identifying tech components and managing supply chains
In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/06062102/secure-ai-1400-400x200.jpg)
In 2024, AI and ML shift from flashy to functional
AI and ML deserve the hype they get, but the focus can’t always be on the glitz. As these advances to deliver real benefits, there’s a slew of more mundane actions that have …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD