Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Stairwell secures $4.5M to help security teams defend against the most sophisticated threats

Stairwell announced $4.5 million in seed investment led by Accel with participation from Sequoia Capital, Gradient Ventures, Allen & Company LLC and other angel …

Cymatic names Stuart McClure to its advisory board

Cymatic announced that Stuart McClure, founder and former chief executive of AI security firm Cylance, has been named to the Cymatic advisory board. Stuart’s security and …

email
Report: The need for pervasive email security

As the number one threat vector for most organizations, email continues to be widely used by cybercriminals to penetrate organizations in support of a wide variety of …

Healthcare IoT
Healthcare network security is slowly improving

Healthcare delivery organizations (HDOs) have been busy increasing their network and systems security in the last year, though there is still much room for improvement, …

US president
How to apply data protection best practices to the 2020 presidential election

It’s safe to assume that we need to protect presidential election data, since it’s one of the most critical sets of information available. Not only does it ensure the …

Hand
76% of applications have at least one security flaw

The majority of applications contain at least one security flaw and fixing those flaws typically takes months, a Veracode report reveals. This year’s analysis of 130,000 …

Code
How important are vulnerability management investments for a cybersecurity posture?

Vulnerability management (VM) technology addresses the threat landscape, which is in a constant state of flux. The wider dispersal of endpoints across private and public cloud …

Working from home
As offices emptied and remote work became the norm, security teams struggled

One Identity released a global survey that reveals attitudes of IT and security teams regarding their responses to COVID-19-driven work environment changes. The results shed …

IoT
Attacks on IoT devices continue to escalate

Attacks on IoT devices continue to rise at an alarming rate due to poor security protections and cybercriminals use of automated tools to exploit these vulnerabilities, …

GrammaTech CodeSentry: Identifying security blind spots in third party code

GrammaTech announced CodeSentry, which performs binary software composition analysis (SCA) to inventory third party code used in custom developed applications and detect …

Cyemptive Technologies cautions of limitations of AI for cyber protection, provides solution

Cyemptive Technologies cautioned entities to recognize the limitations of relying solely on detection based Artificial Intelligence (AI) for cyber protection and outlines the …

Citrix expands its Citrix Ready Workspace Security Program to include zero trust solutions

Work today is happening everywhere on everything from corporate issued laptops and mobile devices to personal tablets and even smartwatches. While this new-found freedom has …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools