strategy
![World](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104019/grunge-world-map-400x200.jpg)
Regional regulatory compliance trends: Strategies and implications
In this podcast, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about regulatory compliance trends that across a variety of different regions in …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105950/artificial_intelligence-400x200.jpg)
Perception and reality: The role of AI and automated cyber defenses
Executives in the U.S. and Europe now place broad trust in artificial intelligence (AI) and machine learning systems, designed to protect organizations from more dynamic …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
Most corporate finance leaders expect to change fraud-fighting strategies
Today’s senior finance executives are battling record levels of fraud, in turn narrowing corporate focus and limiting resources that could otherwise be devoted to …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110326/puzzle-400x200.jpg)
DevSecOps: Build a bridge between fast and secure software development
Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104411/gdpr-1-400x200.jpg)
Why companies shouldn’t dread the advent of GDPR
The main aim of the General Data Protection Regulation (GDPR) is to make sure that the data of EU citizens is protected, no matter where it’s held. The regulation, which will …
![Businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104440/businessman-400x200.jpg)
Fine-tuning the SOX compliance process
The annual Sarbanes-Oxley (SOX) Compliance Survey released by Protiviti reveals a new set of challenges facing public companies amid their compliance efforts. PCAOB audit …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105434/idea-400x200.jpg)
It’s time for a common sense security framework
Privacy Rights Clearinghouse maintains a database of every data breach made public since 2005, and as the total number of records rapidly approaches one billion, board …
![open lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113144/open_lock-400x200.jpg)
Weak DevOps cryptographic policies increase financial services cyber risk
Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is …
![struggle](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104202/struggle-400x200.jpg)
Rising volume of attacks overpowers security teams
New research from IDC that shows organizations are constantly under attack and struggling to keep up. The research finds most organizations run time-consuming security …
![calculator](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104745/calculator-400x200.jpg)
Half of US firms don’t have cybersecurity insurance
A full 50 percent of US firms do not have cybersecurity insurance, despite the fact that 61 percent of US firms expect the volume of cyber breaches to increase in the next …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104211/GDPR-up-400x200.jpg)
Balancing act: Ensuring compliance with GDPR and US regulations
The impending GDPR, which will go into effect in a little less than a year from now, is going to have a significant impact on enterprise cybersecurity and data governance …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104223/idea-400x200.jpg)
5 incident response practices that keep enterprises from adapting to new threats
Security analysts within enterprises are living a nightmare that never ends. 24 hours a day, their organizations are being attacked by outside (and sometimes inside) …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)