Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
PPT security template
Download PPT template: Security for Management

Since management people are not typically cybersecurity savvy, engaging them can be challenging – one must find the balance between high-level explanations, a direct …

brain
ML, AI enthusiasts to showcase cyber solutions at HITB+ CyberWeek’s AI Challenge

Held annually in Asia, Europe and the Middle East, Hack In The Box conferences bring together the world’s top cyber security experts to share and discuss their latest …

click
More than 99% of cyberattacks rely on human interaction

Cybercriminals target people, rather than systems and infrastructure, to install malware, initiate fraudulent transactions, steal data, and more, according to Proofpoint. …

shadow
Shine a light on shadow IT to improve organizational resilience

Shadow IT is one of the biggest challenges facing organizations today. According to Gartner, by 2020, a third of all cybersecurity attacks experienced by enterprises will be …

Degree
70% of educational orgs don’t have an appropriate cloud security budget

Even though cloud technologies are becoming more popular in the education sector, management is still reluctant to invest in cloud data security initiatives, a Netwrix study …

compliance
The use of SOX-specific solutions has more than doubled since last year

There’s a growing demand for advanced technologies to streamline Sarbanes-Oxley Act (SOX) compliance, according to a survey released by the SOX & Internal Controls …

Waterfall Security ebook
eBook: A new gold standard for OT security monitoring

Intrusion detection and security monitoring are mature disciplines on enterprise IT networks but provide limited visibility into operations/OT control systems networks. The …

secure
SMBs show no improvement in IT maturity levels, security remains top concern

IT groups at small and midsize businesses (SMBs) show no improvement in IT maturity levels in three years, while security remains top concern, a Kaseya survey reveals. Based …

privacy
Should social media organizations be subject to strict privacy regulation?

80% of IT security professionals agree that more security and privacy legislation is needed, especially for social media organizations that store personal data. However, …

vote
Bots evolving to better mimic humans during elections

Bots or fake accounts enabled by artificial intelligence on social media have evolved and are now better able to copy human behaviors in order to avoid detection, according to …

5G
The global impact of 5G technologies

A white paper produced by Rysavy Research and 5G Americas technical experts explores the intensifying role of wireless communications, the evolution of its technology, …

CISSP Practice Tests
Mini eBook: CISSP Practice Tests

Download the mini eBook for a sneak peek into the Official (ISC)² CISSP Practice Tests book. Inside you’ll find: 50 CISSP practice test items and answers to gauge your …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools