Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
binary
Getting the most out of your SIEM investment

Over the last 10-15 years, many organizations built Security Operations Centers (SOCs) on the backbone of security information and event management (SIEM) solutions. These …

tunnel
Businesses overconfident about keeping attackers at bay

Despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016, the vast majority of IT professionals still believe perimeter …

London
UK executives badly informed about where data is stored compared to other countries

When it comes to data compliance matters, one in five business decision makers within the UK admit they do not know which compliance regulations their company is subject to, …

Abstract 7
Week in review: Windows 10 against crypto ransomware, satellite phone comms decryption

Here’s an overview of some of last week’s most interesting news and articles: 66% of US law firms reported a breach in 2016 The majority of US-based law firms are …

Kodi
Why Kodi boxes can pose a serious malware threat

When new streaming devices, such as the Amazon Firestick and Apple TV, were first introduced, many were intrigued by the ease by which they could watch “over the …

idea
Five crucial ways to help keep a system safe from harm

We’re living in an incredible age of technology, invention and innovation. It’s hard to imagine that just a short time ago we couldn’t order groceries for delivery from …

Broken glass
66% of US law firms reported a breach in 2016

The majority of US-based law firms are not only exposed in a wide variety of areas, but in many cases, unaware of intrusion attempts. These findings were based on Logicforce …

money
How to create an effective application security budget

Inadequately secured software ranks amongst the most significant root cause issues in cybersecurity. The frequency and severity of attacks on the application layer is greater …

eye
Security’s blind spot: The long-term state of exception

It seems every major hack is accompanied by the pointing of fingers. And there are plenty of places to point them: the servers that weren’t patched, the retailer who hadn’t …

speed
How High-Tech Bridge uses machine learning

In this podcast, Ilia Kolochenko, CEO at High-Tech Bridge, talks about the difference between artificial intelligence and machine learning, and illustrates how his company …

locks
TLS security: Past, present and future

The Transport Layer Security (TLS) protocol as it stands today has evolved from the Secure Sockets Layer (SSL) protocol from Netscape Communications and the Private …

corporate cloud
Cloud IT infrastructure revenues grew 14.9% to $8 billion in 1Q17

Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew 14.9% year over year in the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools