standards
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/24130337/cyber_insurance-1-400x200.jpg)
Keeping up with the demands of the cyber insurance market
Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into …
![Gaspard de Lacroix-Vaubois](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/18104739/gaspard_de_lacroix-vaubois-2-skypher-400x200.jpg)
Tackling cyber risks head-on using security questionnaires
In this Help Net Security interview, Gaspard de Lacroix-Vaubois, CEO at Skypher, talks about the implementation of security questionnaires and how they facilitate assessments …
![Evelyn de Souza](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/21112755/evelyn_de_souza-2-oracle-400x200.jpg)
How global enterprises navigate the complex world of data privacy
In this Help Net Security interview, Evelyn de Souza, Head of Privacy Compliance, Oracle SaaS Cloud, talks about the constant efforts required to keep up with privacy laws in …
![Baya Lonqueux](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/12135755/baya_lonqueux-2-reciproc_it-400x200.jpg)
How companies can take control of their cybersecurity
In this Help Net Security interview, Baya Lonqueux, CEO at Reciproc-IT, discusses the evolving cybersecurity landscape and the essential skillsets needed for teams working in …
![critical infrastructure](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/20113701/critical_infrastructure-industry-400x200.jpg)
Rising OT/ICS cybersecurity incidents reveal alarming trend
60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according …
![Slava Bronfman](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/28110348/slava_bronfman-2-cybellum-400x200.jpg)
Shifting left and right, innovating product security
In this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, …
![BYOD](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/04184407/byod2-400x200.jpg)
Baseline standards for BYOD access requirements
49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how …
![Jonathan Segev](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131051/jonathan_segev-2-ieee-400x200.jpg)
IEEE 802.11az provides security enhancements, solves longstanding problems
In this Help Net Security interview, Jonathan Segev, IEEE 802.11 Task Group (TG) Chair of next-generation positioning (TGaz) at IEEE, discusses IEEE 802.11az. The new standard …
![Roland Atoui](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131101/roland_atoui-2-red_alert_labs-400x200.jpg)
Anticipating the next wave of IoT cybersecurity challenges
In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165921/brain-3d-2-400x200.png)
AI: Interpreting regulation and implementing good practice
Businesses have been using artificial intelligence for years, and while machine learning (ML) models have often been taken from open-source repositories and built into …
![airport security](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103802/airport-security-400x200.jpg)
Strengthening travel safety protocols with ISO 31030
In this Help Net Security video, Tracy Reinhold, Chief Security Officer at Everbridge, talks about ISO 31030, the officially recognized International Standard for travel risk …
![NIST](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/17142818/nist-logo-x-400x200.jpg)
NIST chooses encryption algorithms for lightweight IoT devices
ASCON is the name of the group of lightweight authenticated encryption and hashing algorithms that the U.S. National Institute of Standards and Technology (NIST) has chosen to …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD