Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
chess
How entrepreneurs can capitalize on the impending golden age of cybersecurity

As the markets continue to fluctuate, budget cuts and layoffs now extend across the tech industry, with cybersecurity no exception from tightening its belt and assessing its …

cyber insurance
What cyber insurance really covers

With cybersecurity threat vectors evolving every day and with attackers employing a more innovative and unpredictable approach through combining various types of attack, it’s …

money
Cyber risk focus areas for portfolio companies

IT management is a top concern, with many portfolio companies struggling with IT hygiene, potentially leaving them susceptible to costly breaches, according to a report from …

Microsoft 365
90% of organizations have Microsoft 365 security gaps

A recently published study evaluated 1.6 million Microsoft 365 users across three continents, finding that 90% of organizations had gaps in essential security protections. …

Handshake
ReasonLabs joins Anti-Malware Testing Standards Organization to strengthen anti-malware solutions

ReasonLabs has joined the Anti-Malware Testing Standards Organization (AMTSO), an international non-profit association that focuses on addressing the global need for …

security platform
Spring Labs TrueZero enables companies to exchange sensitive data without revealing PII

Spring Labs launched TrueZero, a tokenization service that enables companies to exchange information with other financial institutions without ever revealing the underlying …

Cobalt Strike
Google seeks to make Cobalt Strike useless to attackers

Google Cloud’s intelligence research and applications team has created and released a collection of 165 YARA rules to help defenders flag Cobalt Strike components deployed by …

shield
Future-proofing asset and vulnerability intelligence in response to CISA’s BOD 23-01

Modern environments have become more dynamic and the need for equally progressive asset discovery techniques has intensified. The new Cybersecurity and Infrastructure Security …

CISA free resources
5 free resources from the Cybersecurity and Infrastructure Security Agency (CISA)

The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security. CISA is in charge of enhancing cybersecurity and …

servers
Legacy IT system modernization largely driven by security concerns

For the first time ever, digitalization is the driving force across the enterprise, according to Advanced’s Mainframe Modernization Business Barometer Report. Organizations …

code
Three security design principles for public REST APIs

In this Help Net Security video, Dr. Pedram Hayati, Founder of SecDim, offers a technical write-up based on a secure programming challenge. The task was inspired by a major …

Kubernetes
The pros and cons of using open-source Kubernetes security software

Open source tools are a key part of the Kubernetes security environment, with most companies using open source Kubernetes security software, research by ARMO has revealed. In …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools