strategy
![bad bots](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10164708/bad_bots-400x200.jpg)
How smart bots are infecting and exploiting the internet
According to Imperva, bad bot traffic grew to 30.2%, a 2.5% increase over 2021. In this Help Net Security video, Lynn Marks, Senior Product Manager at Imperva, discusses …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
CISO-level tips for securing corporate data in the cloud
The presence of each third-party application increases the potential for attacks, particularly when end users install them without proper oversight or approval. IT security …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/07162135/gears-400x200.jpg)
Gap between OT security assumptions and reality
In the fast-evolving landscape of technology and connectivity, ensuring the security of operational technology (OT) systems has become a paramount concern for organizations …
![Scytale](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/18112839/scytale-compliance-400x200.jpg)
How continuous security monitoring is changing the compliance game
Managing compliance doesn’t have to be draining, time-consuming, or overly complicated. In this Help Net Security video, Wesley Van Zyl, Senior Manager, Compliance …
![Esti Peshin](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/21160537/esti_peshin-podcast-400x200.jpg)
What flying a plane can teach you about cybersecurity
Before taking on the role as GM of IAI’s cyber division, Esti Peshin was the Director General of the Hi-Tech Caucus in Israel’s parliament, balancing legislation and …
![Brian Behlendorf](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/16103314/brian_behlendorf-2-open_ssf-400x200.jpg)
Enhancing open source security: Insights from the OpenSSF on addressing key challenges
In this Help Net Security interview, we meet a prominent industry leader. Brian Behlendorf, CTO at the Open Source Security Foundation (OpenSSF), shares insights on the …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/07124918/supply_chain_security-1-400x200.jpg)
Preparing for federal supply chain security standardization
In 2021, the Biden Administration published the Executive Order on Improving the Nation’s Cybersecurity (EO 14028), setting off an agency-wide security initiative with the …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135229/zero-number-2-400x200.jpg)
3 tips to accelerate zero trust adoption
Zero trust adoption is beginning to accelerate as networks get more complex. Gartner predicts that by 2026, 10% of large enterprises will have a comprehensive, mature, and …
![Vivek Ramachandran](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10111756/vivek_ramachandran-2-square-400x200.jpg)
SquareX’s vision: A future where internet security is a non-issue
With an ever-evolving landscape of cyber threats, the necessity for innovative, effective, and user-friendly security products has never been more apparent. Current security …
![search](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/16143539/search-look-400x200.jpg)
CISOs confront mounting obstacles in tracking cyber assets
Monitoring assets in ever-changing settings operating in both development and production stages presents challenges. In this Help Net Security video, Daniel Deeney, CEO at …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094216/brain-400x200.jpg)
How AI is reshaping the cybersecurity landscape
The success of ChatGPT, a text-generation chatbot, has sparked widespread interest in generative AI among millions of people worldwide. According to Jumio’s research, …
![The VC Field Guide](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/24123526/vc_field_guide-book-400x200.jpg)
Introducing the book: The VC Field Guide
In this Help Net Security video interview, cybersecurity entrepreneur, founder, innovator, and investor William Lin discusses his new book – The VC Field Guide. In this …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality