Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Hacking Exposed 7: Network Security Secrets and Solutions

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today’s most devastating attacks and proven countermeasures. The 7th …

Week in review: Yahoo password leak, multi-platform backdoor, Microsoft revokes its code-signing certificates

Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: Worldwide IT spending to surpass $3.6 trillion in 2012 In …

Big brands utilized in malware distribution

Commtouch security analysts have seen substantial continued blending of big brand names with malware. Researchers named the following top seven brands that were abused in …

Majority of small businesses not confident in network security

More than half of IT administrators at small businesses would not bet their own money that all of the computers their business owns and employees use are free of malware (51%) …

VKernel announces integration support with Microsoft System Center 2012

VKernel released the integration compatibility between its vOPS Server product line and Microsoft System Center 2012. This integration adds capabilities to Microsoft System …

GFI Software launches cloud security and networking platform

GFI Software announced GFI Cloud, a platform for the delivery of cloud services via a Web-based user interface, accessible from anywhere with an Internet connection. …

Top skills for IT asset management leaders

The evolving and growing role of IT asset management (ITAM) is driving both increased demand for existing skills and a new requirement for augmented financial, commercial and …

Major pitfalls involving vulnerability scanners

While 92 percent of companies have a vulnerability management program in place, nearly half consider their networks to range from “somewhat” to …

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …

Do you need a honeypot?

It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …

Bruce Schneier: Trust, security and society

Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of …

Targeted attacks focus on small businesses

36 percent of all targeted attacks (58 per day) during the last six months were directed at businesses with 250 or fewer employees, according to Symantec. During the first …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools