Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
odix
Odix is disarming the growing malware threat

So far, 2020 has been a rough year for everyone not just for the cybersecurity space. Various threats and vulnerabilities have already led to cyberattack incidents during the …

CEO
CISOs: Quantifying cybersecurity for the board of directors

Only 9% of security teams feel as if they are highly effective in communicating security risks to the board and to other C-suite executives, according to a recent survey …

analyst
Top threat detection trends and challenges for cybersecurity professionals

User networks and endpoints are the biggest concerns for 65% of respondents, an 11% increase from last year, Attivo Networks reveals. Exploring the top threat detection trends …

ransomware
46% of SMBs have been targeted by ransomware, 73% have paid the ransom

Ransomware attacks are not at all unusual in the SMB community, as 46% of these businesses have been victims. And 73% of those SMBs that have been the targets of ransomware …

traffic
COVID-19 affects web traffic and attack trends

There have been significant changes in web attack and traffic trends as a result of COVID-19, according to Imperva. The monthly report also revealed that the Cyber Threat …

Hoxhunt
How Hoxhunt minimizes cybersecurity risks from human error

Cybersecurity has become a top priority for most companies. Many businesses have already invested significantly in security software to mitigate attacks. Corporate tech …

BYOK
Multi-cloud key management and BYOK

Cloud providers such as Google Cloud Platform, AWS, and Microsoft Azure work hard to be the service provider of choice for enterprise customers. They often push the envelope …

code
Understanding web security solutions

As should be evident to anyone in the cyber security industry, the wide range of available web security solutions from commercial vendors will necessarily have varying degrees …

chip
Starbleed vulnerability: Attackers can gain control over FPGAs

Field Programmable Gate Arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. Starbleed …

DDoS
Average bandwidth of DDoS attacks increasing, APIs and applications under attack

The volume and complexity of attacks continued to grow in the first quarter of 2020, according to Link11. There has been an increasing number of high-volume attacks in Q1 …

laptop
Does working remotely actually work?

In the blink of an eye, remote work went from an experiment to a requirement. And as the results of a recent survey conducted by OnePoll reveal, work has a completely new look …

Cyber-Risk Oversight 2020
Handbook: Cyber-Risk Oversight 2020

The Internet Security Alliance (ISA) and the European Confederation of Directors’ Associations (ecoDa) released Cyber-Risk Oversight 2020, a handbook on cyber-risk management …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools