Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
labyrinth
Organizations must rethink traditional IT strategy to succeed in the new normal

64% of IT pros are instilled with a new sense of confidence, despite contending with challenges such as reduced budgets, greater decision-making responsibilities, and longer …

money
What happens to funds once they have been stolen in a cyberattack?

SWIFT and BAE Systems published a report that describes the complex web of money mules, front companies and cryptocurrencies that criminals use to siphon funds from the …

idea
Intelligent processes and tech increase enterprises’ competitiveness

Enterprises of the future will be built on a foundation of artificial intelligence (AI), analytics, machine learning, deep learning and automation, that are central to solving …

(ISC)2 exam
(ISC)² Exam Action Plan: Get your certification goals on track for success

Even the best-laid plans can go astray, that’s why we stand ready as ever to help you get your certification goals back on track for success. Every (ISC)² member started out …

Credo unveils the DOVE Platform, a low power PAM4 DSP family for high-speed data networks

Credo announced the DOVE Platform, the second generation, low power PAM4 DSP family for high-speed data networks. The DOVE Platform includes products for 100/200/400G optical …

Speech Recognition capability provides added secure payment option for PCI Pal customers

PCI Pal announced the addition of Speech Recognition capability for both its Agent Assist and IVR Payment solutions. With this new feature, PCI Pal users now have the option …

Signifyd, CTI Digital and supercharged help merchants provide abuse and fraud protection

Signifyd, CTI Digital and supercharged commerce announced a partnership that combines the digital experience of two of Europe’s premiere agencies with Signifyd’s superior …

Patch Tuesday
September 2020 Patch Tuesday: Microsoft fixes over 110 CVEs again

On this September 2020 Patch Tuesday: Microsoft has plugged 129 security holes, including a critical RCE flaw that could be triggered by sending a specially crafted email to …

Popular Android apps are rife with cryptographic vulnerabilities

Columbia University researchers have released Crylogger, an open source dynamic analysis tool that shows which Android apps feature cryptographic vulnerabilities. They also …

securing Active Directory
Securing Active Directory accounts against password-based attacks

Traditional password-based security might be headed for extinction, but that moment is still far off. In the meantime, most of us need something to prevent our worst instincts …

Eyes
Mapping the motives of insider threats

Insider threats can take many forms, from the absent-minded employee failing to follow basic security protocols, to the malicious insider, intentionally seeking to harm your …

vault
Cybersecurity after COVID-19: Securing orgs against the new threat landscape

Picture this: An email comes through, offering new COVID-19 workplace safety protocols, and an employee, worn down by the events of the day or feeling anxious about their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools