Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
build
OpenDXL Ontology: An open source language for connecting cybersecurity tools

The Open Cybersecurity Alliance (OCA) today announced the availability of OpenDXL Ontology, the first open source language for connecting cybersecurity tools through a common …

shield
Changing the mindset of the CISO: From enforcer to enabler

With digital transformation investments expected to reach a staggering $7.4 trillion before 2023, organizations realize that they must disrupt their markets or risk being …

David Rupprecht and Dr. Katharina Kohls
By exploiting an LTE vulnerability, attackers can impersonate mobile phone users

Exploiting a vulnerability in the mobile communication standard LTE, researchers at Ruhr-Universität Bochum can impersonate mobile phone users. Consequently, they can book …

password
Users still engaging in risky password, authentication practices

IT security practitioners are aware of good habits when it comes to strong authentication and password management, yet often fail to implement them due to poor usability or …

M-Trends 2020 Report
Increased monetization means more ransomware attacks

Organizations are detecting and containing attacks faster as the global median dwell time, defined as the duration between the start of a cyber intrusion and it being …

data
Organizations lack confidence in their network security

IoT is barreling toward the enterprise, but organizations remain highly vulnerable to IoT-based attacks, according to Extreme Networks. The report, which surveyed 540 IT …

Eyes
97% of IT leaders worried about insider data breaches

A staggering 97% of IT leaders say insider breach risk is a significant concern, according to a survey by Egress. 78% think employees have put data at risk accidentally in the …

Cynet CISO checklist
Download: The Ultimate Security Pros’ Checklist

The Ultimate Security Pros’ Checklist provides you with a concise and actionable way to keep track of all your operational, management and reporting tasks. This checklist …

Innodisk launches integrated security solutions that harness the power of AIoT

Our increasingly connected world brings enormous potential for social and economic growth. However, without sophisticated security solutions that address the diverse threats …

Search
Gurucul launches new AI/ML behavior analytics for guided proactive hunting of unknown threats

Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, introduced automated intelligent threat hunting that uses artificial …

SS8 Networks offers cloud-based end-to-end lawful intelligence solution built on AWS

SS8 Networks, a leader in Lawful Intercept and Monitoring Center platforms, is proud to announce the completion of the first Lawful Intelligence platform built on Amazon Web …

Ciena adds new products and capabilities to its 5G Network Solutions

Ciena added several new products and capabilities to its 5G Network Solutions aimed at reducing network complexity and fueling operators’ migration from 4G to 5G – from radios …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools