Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
keyboard
IT security teams deal with unique challenges fueled by a remote workforce

IT security teams faced unprecedented challenges last year fueled by dramatically expanded work-from-home (WFH) programs, increased BYOD policy adoptions, and rising internal …

5G
Technologies, markets and apps transitioning to the 5G communications era

ResearchAndMarkets released a report that addresses several current technologies (as well as their markets, applications, and other characteristics) that, according to the ITU …

Cybersecurity risk management
Cybersecurity only the tip of the iceberg for third-party risk management

Most companies are missing key risks at more than one stage of the vendor risk lifecycle, yet few are expanding their TPRM programs to address these risks, according to …

HNS QR code
Most users don’t know the capabilities and risks of QR codes

QR code usage continues to rise in popularity. In fact, 57% of respondents to a new Ivanti study claim to have noticed an increase in the usage of QR codes since mid-March …

cloud
Complexity and budgetary constraints complicate cloud security

While spending on cloud services is high, with more than half of respondents having spent more than $10 million and 11% having spent more than $100 million in the last three …

digital transformation
Most enterprise leaders concerned about digital transformation ROI

Digital.ai released a report detailing the findings of a survey of over 600 enterprise IT, security, and business decision makers on the state of digital transformation in …

Facebook
Facebook Messenger users targeted by a large-scale scam

A large-scale scam campaign targeting Facebook Messenger users all over the world has been detected by Group-IB. Digital Risk Protection (DRP) analysts have found evidence …

zero
Approaching zero trust security strategically

With digital transformation efforts accelerating, the attack surface expanding exponentially and conventional perimeter-based security continuing to fail, there’s never been a …

Accurics
Product showcase: Accurics

It is no big secret that infrastructure has changed over the last decade. We went from tools such as autossh, to configuration management, and ended up with Infrastructure as …

lock
Consumer data protection is a high priority, but there’s still work to be done

Enterprises see protecting customer personal information as the top reason to encrypt data, and yet report actually encrypting customer data at a far lower rate. This and …

Panorays guide
CISO’s guide to automating third-party cyber risk management

With increasing dependence on third parties in today’s interconnected world, vendor security risk assessments are more essential than ever. Failing to do them may result in …

vulnerability
Even though critical, web application security is getting less attention

As organizations shifted focus to support remote work and business continuity amid the challenges of 2020, web application security suffered, according to an Invicti Security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools