The limitations of shifting left in application security
In this Help Net Security video, Jacob Garrison, Security Research for Bionic, explains the limitations of shifting left in application security. Key factors hindering the …
The future of passwords and authentication
In this Help Net Security video, Michael Crandell, CEO of Bitwarden, discusses the future of passwords and authentication. Although interest in passwordless technology, which …
What if the browser was designed for the enterprise?
Bradon Rogers, Chief Customer Officer at Island, provides an overview of the Island Enterprise Browser. Learn more at Infosecurity Europe 2023 – June 20-22, 2023.
How to simplify the process of compliance with U.S. Executive Order 14028
In this Help Net Security video, Nick Mistry, SVP and CISO at Lineaje, offers tips to simplify the process of compliance with U.S. Executive Order 14028. A key part of U.S. …
Exploring the role of AI in cybersecurity
In this Help Net Security round-up, we present parts of previously recorded videos from experts in the field that discuss about how AI technologies will impact the …
Introducing the book: Visual Threat Intelligence
In this Help Net Security video interview, Thomas Roccia, Senior Security Researcher, discusses his new book – Visual Threat Intelligence. The book covers a wide range …
How cybercriminals target energy companies
In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses how cybercriminals employ specialized strategies when targeting …
What is a browser doing at Infosecurity Europe 2023?
What if the enterprise had complete control over the browser? What would it do for security, productivity, for work itself? Ari Yablok, Head Of Brand at Island, invites you to …
Enhancing security team capabilities in tough economic times
According to ESG, 70% of cybersecurity pros expect budget cuts or freezes this year, which, in turn, will trigger project delays and greater vendor scrutiny. Understaffing and …
NetSPI Breach and Attack Simulation (BAS) platform demo
Only 20 percent of common attack behaviors are caught by EDR, SIEM, and MSSP out-of-the-box solutions. Contrary to what many BAS vendors and technology providers claim, 100% …
Quantum computing’s threat to national security
In this Help Net Security video, Denis Mandich, CTO at Qrypt, talks about quantum computing. If we thought AI turned security and privacy on their head, quantum computing will …
Examining the long-term effects of data privacy violations
Regulatory bodies are taking potential data privacy violations much more seriously this year after a relatively quiet period that followed the enactment of regulations such as …