strategy
![Nate Warfield](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18122458/nate_warfield-2-eclypsium-400x200.jpg)
CISOs’ role in identifying tech components and managing supply chains
In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains …
![Randy Marchany](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17140152/randy_marchany-2-virginia_tech-400x200.jpg)
Prioritizing CIS Controls for effective cybersecurity across organizations
In this Help Net Security interview, Randy Marchany, CISO at Virginia Tech, discusses the challenges and strategies associated with implementing CIS Controls in organizations …
![Securities and Exchange Commission](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/31085518/sec2-400x200.jpg)
Without clear guidance, SEC’s new rule on incident reporting may be detrimental
The SEC has instituted a set of guidelines “requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material …
![Tim Morris](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/11103343/tim_morris-2-tanium-400x200.jpg)
Ransomware negotiation: When cybersecurity meets crisis management
In this Help Net Security interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should …
![Chris Mixter](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/05115249/chris_mixter-2-gartner-400x200.jpg)
CISOs’ crucial role in aligning security goals with enterprise expectations
In this Help Net Security interview, Chris Mixter, Vice President, Analyst at Gartner, discusses the dynamic world of CISOs and how their roles have evolved significantly over …
![cybersecurity frameworks](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/16180902/cybersecurity_frameworks-1400-400x200.jpg)
10 cybersecurity frameworks you need to know about
As cyber threats grow more sophisticated, understanding and implementing robust cybersecurity frameworks is crucial for organizations of all sizes. This article lists the most …
![Yoav Nathaniel](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/10112839/yoav_nathaniel-2-silk-400x200.jpg)
Key elements for a successful cyber risk management strategy
In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common …
![Alexander Hagenah](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/04140117/alexander_hagenah-2-six_group-400x200.jpg)
Embracing offensive cybersecurity tactics for defense against dynamic threats
In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160752/llms-2-400x200.jpg)
Top LLM vulnerabilities and how to mitigate the associated risk
As large language models (LLMs) become more prevalent, a comprehensive understanding of the LLM threat landscape remains elusive. But this uncertainty doesn’t mean progress …
![security awareness](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18071416/sec-awareness-400x200.jpg)
The power of basics in 2024’s cybersecurity strategies
In this Help Net Security video, Nick Carroll, Cyber Incident Response Manager at Raytheon, discusses how while organizations will be challenged to strengthen their defenses …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203458/data_analytics5-400x200.jpg)
If you prepare, a data security incident will not cause an existential crisis
Why is it that when a company becomes aware of a potential data security incident, the team working on it (and others who are made aware that “something” is going on) have an …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/06062102/secure-ai-1400-400x200.jpg)
Securing AI systems against evasion, poisoning, and abuse
Adversaries can intentionally mislead or “poison” AI systems, causing them to malfunction, and developers have yet to find an infallible defense against this. In …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality