Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Qualys CertView
Manage SSL/TLS certificates across IT environments with Qualys CertView

Qualys announced CertView, a new app framework in the Qualys Cloud Platform that enables customers to discover, assess and manage SSL/TLS certificates on a global scale, …

signature
Is cyber insurance worth the paper it’s written on?

Weighing up whether you think insurance is worth it, in any situation, depends to some extent on personal experience. You can see the value of protection far more clearly if …

GDPR
As GDPR approaches, retail data breaches remain unacceptably high

Two in five retailers across the globe have experienced a data breach in the past year, according to Thales and 451 Research. The report reveals that 43 percent of retailers …

connection
IT operators see promise in DevOps and new tech

A new Ponemon Institute survey of nearly 1,250 global public sector IT decision makers and managers revealed that public sector organizations undergoing digital transformation …

geometry
Week in review: macOS security, Segway vulns, and the SOC of the future

Here’s an overview of some of last week’s most interesting news and articles: The future of macOS security: Baked-in protection and third-party tools Anyone in the …

Black Hat
Qualys at Black Hat USA 2017: Best practices and case study presentations

There will be no lack of interesting content from Qualys at Black Hat next week. Depending on you interests, you might want to make time for some of these talks and …

firefighters
Companies unprepared to measure incident response

Companies struggle to keep up with and respond to cyberattacks due to lack of resources, according to Demisto. For example, more than 40 percent of respondents said their …

earth
Destruction of Service attacks could shut down organizations for good

The Cisco 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential Destruction of …

User
Every organization is only one click away from a potential compromise

Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with vastly greater potential for …

eye
Assessing the habits and tactics of organized credit card fraud gangs

By analyzing hundreds of criminal forums, Digital Shadows discovered a new trend in the form of remote learning ‘schools’. Available to Russian speakers only, these six-week …

IoT
How healthcare IT decision makers approach IoT security

More than 90% of healthcare IT networks have IoT devices connected to them. Over 70% of IT departments believe that the traditional security solutions used to secure laptops …

Segway miniPRO
Critical security vulnerabilities enable full control of the Segway miniPRO electric scooter

New IOActive research exposes critical security vulnerabilities found in the Segway miniPRO electric scooter. If exploited, an attacker could bypass safety systems and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools