Features
![Anya Shpilman](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/31122017/anya_shpilman-2-wdigital-400x200.jpg)
Choosing the right partner when outsourcing cybersecurity
In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential risks of outsourcing …
![Jamieson O'Reilly](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16114229/jamieson-oreilly-2-dvuln-400x200.jpg)
Enhancing adversary simulations: Learn the business to attack the business
In this Help Net Security interview, Jamieson O’Reilly, Founder of DVULN, discusses adversary simulations, shedding light on challenges rooted in human behavior, …
![Marco Eggerling](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16122954/marco_eggerling-2-check_point-400x200.jpg)
How CISOs navigate policies and access across enterprises
In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and …
![Roland Palmer](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18120415/roland_palmer-2-sumo_logic-400x200.jpg)
NIS2 Directive raises stakes for security leaders
In this Help Net Security interview, Roland Palmer, VP Global Operations Center at Sumo Logic, discusses key challenges and innovations of the NIS2 Directive, aiming to …
![Isaac Evans](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17115957/isaac_evans-2-semgrep-400x200.jpg)
Custom rules in security tools can be a game changer for vulnerability detection
In this Help Net interview, Isaac Evans, CEO at Semgrep, discusses the balance between speed and thoroughness in CI/CD pipeline security scanning. Stressing the need to avoid …
![Stephanie Hagopian](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/22122101/stephanie_hagopian-2-cdw-400x200.jpg)
Proactive cybersecurity: A strategic approach to cost efficiency and crisis management
In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of complex cyberattacks and the role of the …
![Alon Gal](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18132643/alon_gal-2-hudsonrock-400x200.jpg)
Prioritizing cybercrime intelligence for effective decision-making in cybersecurity
In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will …
![Amber Schroader](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18130930/amber_schroader-2-paraben_corporation-400x200.jpg)
Emerging trends and strategies in digital forensics
In this Help Net Security interview, Amber Schroader, CEO at Paraben Corporation, discusses the challenges posed by the complexity of modern computer systems and networks on …
![Nate Warfield](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18122458/nate_warfield-2-eclypsium-400x200.jpg)
CISOs’ role in identifying tech components and managing supply chains
In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains …
![Randy Marchany](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17140152/randy_marchany-2-virginia_tech-400x200.jpg)
Prioritizing CIS Controls for effective cybersecurity across organizations
In this Help Net Security interview, Randy Marchany, CISO at Virginia Tech, discusses the challenges and strategies associated with implementing CIS Controls in organizations …
![Jean-Philippe Aumasson](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17140145/jean_philippe_aumasson-2-taurus-400x200.jpg)
Beyond blockchain: Strategies for seamless digital asset integration
In this Help Net Security interview, Jean-Philippe Aumasson, CSO at Taurus, emphasizes the often-overlooked complexities of key generation, storage, and distribution, …
![Ivan Reedman](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/11115622/ivan_reedman-2-ioactive-400x200.jpg)
The reality of hacking threats in connected car systems
With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD