Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
build
Latest Building Security In Maturity Model reflects software security initiatives of 120 firms

Synopsys released BSIMM9, the latest version of the Building Security In Maturity Model (BSIMM) designed to help organizations plan, execute, and measure their software …

risk
In terms of main threat actors, expectation rarely matches reality

Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based …

lightbulb
It only takes one data point to blow open a threat investigation

Because cybersecurity has been such a pain point for businesses, it’s easy to assume that threat investigations are difficult and unwieldy to manage. When you consider what’s …

password
True password behaviors in the workplace revealed

LastPass released the “2018 Global Password Security Report,” revealing true password behaviors in the workplace and creating a benchmark that businesses can use …

Europe
SIE Europe: Data sharing initiative to combat cybercrime launches

SIE Europe emerged from stealth mode to launch an initiative to enable European organisations to contribute and share Internet data. This consortium advances the detection and …

cloud storage
Worldwide spending on cloud IT infrastructure continues to grow, reaches $15.4 billion

According to the IDC Worldwide Quarterly Cloud IT Infrastructure Tracker, vendor revenue from sales of infrastructure products (server, enterprise storage, and Ethernet …

USA
California Governor signs strong net neutrality protections into law

California Governor Jerry Brown signed into law SB 822, the strongest and most comprehensive state-level net neutrality bill in the country. The bill passed the state …

strategy
Organizations need to shift strategies, adopt a proactive approach to cybersecurity

The cybersecurity market has reached a point whereby organisations need to shift their strategies and have a new, proactive approach to their cybersecurity, according to a …

quantum
Quantifying a firm’s security levels may strengthen security over time

Cyberattacks grow in prominence each and every day; in fact, 2017 was the worst year to-date for data breaches, with the number of cyber incidents targeting businesses nearly …

shop online
Explosion of look-alike domains aims to steal sensitive data from online shoppers

Venafi released research on the explosion of look-alike domains, which are routinely used to steal sensitive data from online shoppers. Venafi’s research analyzed suspicious …

brain
New tools from IBM and Google reveal it’s hard to build trust in AI

The unseen dangers inherent in artificial intelligence (AI) are proving the importance of IBM and Google’s diverse approach to this multifaceted problem. Brad Shimmin and …

Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures

Here’s an overview of some of last week’s most interesting news and articles: What do you mean by storage encryption? Depending on the threat context and how you …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools