Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
lock
Attackers use fallback ransomware if LockBit gets blocked

Your security solutions might stave off a LockBit infection, but you might still end up with encrypted files: according to Symantec’s threat researchers, some affiliates …

HNS
SecurityScorecard and Measured Analytics and Insurance strengthen proactive cybersecurity strategies

SecurityScorecard announced an alliance with Measured Analytics and Insurance, the AI-powered cyber insurance provider. The initiative delivers a cyber insurance premium …

cloud
Access control in cloud-native applications in multi-location environments (NIST SP 800-207)

NIST released Special Publication (SP) 800-207A – “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location …

Librem 11 tablet
Librem 11 tablet sets new standard for privacy and security with Linux-based PureOS

Purism introduced the new Librem 11 tablet running secure PureBoot and Linux kernel-based PureOS. Librem 11 is made for individuals, organizations, government agencies, law …

brain
Great security training is a real challenge

All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to be the largest …

hands
The critical role of authorization in safeguarding financial institutions

According to a recent Cost of Data Breach report, the financial industry has the second highest average cost for a data breach, making the value well worth financial …

smartphone
Mobile Verification Toolkit: Forensic analysis of Android and iOS devices to identify compromise

Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of …

Ultimate guide to Certified in Cybersecurity
Download: Ultimate guide to Certified in Cybersecurity

The ultimate guide covers everything you need to know about the entry-level Certified in Cybersecurity certification and how to get started with FREE training and exam through …

HNS
CISO Global Threat Informed captures and analyzes data posted to darknets

CISO Global is expanding its capabilities by deepening its threat intelligence feed and incorporating it into existing services. Named ‘Threat Informed’, this new …

HNS
SentinelOne releases Singularity RemoteOps Forensics to improve incident response for companies

Cyber breaches are on the rise, and when it comes to responding to them, time is of the essence. In order to drive swift conclusions, security teams need to identify relevant …

HNS
Torii launches generative AI-powered SaaS Management Platform

Torii has introduced its next generation SaaS Management Platform (SMP), featuring a series of product releases that set a new standard for innovation and extensibility in …

HNS
Armis Centrix delivers a modular approach to cyber exposure management

Armis has launched Armis Centrix, the AI-powered cyber exposure management platform. Armis Centrix is a seamless, frictionless, cloud-based platform that proactively secures …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools