Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
dotcom
Not all domain registrars are created equal: Consumer-grade vs. enterprise-class

SecurityScorecard and CSC released comprehensive research detailing the impacts of an organization’s choice in domain registrar on their overall security ratings. The research …

week in review
Week in review: Log4Shell updates, Kronos ransomware attack, unused identities threat

Here’s an overview of some of last week’s most interesting news, articles and interviews: Log4Shell: A new fix, details of active attacks, and risk mitigation …

Develop a cybersecurity team
Want to assemble a cyber Dream Team? Look back at the ‘92 Olympics

A common question I often receive from organizational leaders is how to assemble the right team that can ensure their enterprise is positioned to effectively combat the …

user
Digital IDs don’t have to impinge on civil liberties and privacy

The shift towards an increasingly digital world has become overwhelmingly apparent. The coronavirus era has forced a technological leap on all fronts, and incumbent …

immudb
Immudb: Open-source database, built on a zero trust model

Now, with full transactional support for everyday business applications, the open source immudb tamper-proof database can serve as the main transactional database for …

cloud complexity
Why is a well thought-out approach to cloud migration imperative?

The big move to the cloud is bringing as many challenges as opportunities, a database monitoring survey from Redgate has found. With 80% of organizations now using a mix of …

stats
European UCaaS market to gain momentum in 2022

A ResearchAndMarkets study provides an in-depth analysis of trends, growth factors and growth opportunities in the European UCaaS market. UCaaS providers will pursue untapped …

Log4j
The impact of the Log4j vulnerability on OT networks

Operational Technology (OT) networks are at risk from the recently-announced Apache Log4j (CVE-2021-44228) vulnerability. On the surface, it is not clear why this should be. …

fix
How to implement security into software design from the get-go

Software professionals know that the working relationship between developers and security teams can be complicated. Most security professionals feel it’s part of a …

EU
Europe’s quantum communication plans: Defending against state-sponsored cyber attacks

State-sponsored cyberattacks are on the rise and are a significant part of the future of warfare. Why would a nation send humans to a frontline when it can take out the …

data
When done right, network segmentation brings rewards

96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, …

shop online
Online shopping at risk: Mobile application and API cyber attacks at critical high

Protecting mobile applications and APIs against automated threats is a top priority for online commerce businesses, according to data from a study published by DataDome. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools