Cybersecurity jobs available right now in the USA: March 20, 2025 – Help Net Security

Cybersecurity jobs available right now in the USA: March 20, 2025 – Help Net Security

AI Security Architect Verizon | USA | Hybrid – View job details As an AI Security Architect, you will ensure security architecture reviews are integrated into Verizon’s AI development lifecycle. This includes embedding robust security measures from design to deployment, conducting risk assessments on AI models, and implementing security tools and protocols in AI/ML operations….

Read More
How to prevent data leakage in collaboration tools like Slack and Teams – Help Net Security

How to prevent data leakage in collaboration tools like Slack and Teams – Help Net Security

In recent years, collaboration tools have become an absolute necessity for remote and hybrid work. This primarily increased during the COVID-19 pandemic due to the impossibility of communicating in person. So, tools like Slack, Microsoft Teams, and Zoom surged in popularity, enabling employees to stay connected despite physical distances. But this sudden transition to online…

Read More
OT/ICS cyber threats escalate as geopolitical conflicts intensify – Help Net Security

OT/ICS cyber threats escalate as geopolitical conflicts intensify – Help Net Security

Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming mainstream targets, and even sophisticated threat actors use relatively unsophisticated tactics to infiltrate and disrupt industrial operations. State-sponsored groups embed themselves in…

Read More
Versa Sovereign SASE enables organizations to create self-protecting networks – Help Net Security

Versa Sovereign SASE enables organizations to create self-protecting networks – Help Net Security

Versa releases Versa Sovereign SASE, allowing enterprises, governments, and service providers to deploy customized networking and security services directly from their own infrastructure in a “do-it-yourself” model. This approach addresses the growing demand for greater control amidst evolving data privacy regulations, heightened security threats, and challenges posed by reliance on third-party SaaS infrastructure. The benefits…

Read More
How CISOs can balance security and business agility in the cloud – Help Net Security

How CISOs can balance security and business agility in the cloud – Help Net Security

In this Help Net Security interview, Natalia Belaya, CISO at Cloudera, discusses common misconceptions about cloud security, the balance between protection and business agility, and overlooked risks that CISOs should prioritize. Belaya also offers practical strategies for integrating cloud-native security solutions and mitigating misconfigurations at scale. What key security principles should enterprises follow when migrating…

Read More
Arvest Bank CISO on building a strong cybersecurity culture in banking – Help Net Security

Arvest Bank CISO on building a strong cybersecurity culture in banking – Help Net Security

In this Help Net Security interview, Mike Calvi, CISO at Arvest Bank, discusses building a strong cybersecurity culture within the banking sector. He explains how leadership, effective reporting, and proactive engagement with associates are key in strengthening security. Calvi also touches on how banks can measure success and balance accountability while fostering a collaborative environment….

Read More
What you can do to prevent workforce fraud – Help Net Security

What you can do to prevent workforce fraud – Help Net Security

In this Help Net Security interview, Benjamin Racenberg, Senior Intelligence Services Manager at Nisos, discusses the threat of workforce fraud, particularly DPRK-affiliated IT workers infiltrating remote roles. With HR teams and recruiters often unprepared to detect these sophisticated schemes, businesses face significant cybersecurity and employment risks. Racenberg also discusses the tactics used by these threat…

Read More