Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
tools
How to empower IT Sec and Ops teams to anticipate and resolve IT problems

Every IT system administrator knows the misery of facing a problem for which the root cause requires hours (and sometimes days) to unearth, all the while part of the IT …

healthcare
Help Net Security: Healthcare Cybersecurity Report has been released

Our newest report takes a closer look at one of the most targeted industries today – healthcare. As exhausted healthcare professionals struggle with an extraordinary …

CIS
How configuration assessments help improve cyber defenses

There’s an old adage in business; if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security …

CIS Elements
3 key elements of a strong cybersecurity program

The world relies on technology. So, a strong cybersecurity program is more important than ever. The challenge of achieving good cyber hygiene can be especially acute for …

Malcolm Harkins
How to measure security efforts and have your ideas approved

In this interview with Help Net Security, Malcolm Harkins, Chief Security & Trust Officer, Epiphany Systems, talks about the challenges security leaders must face when …

Group-IB Threat Intelligence & Attribution (TI&A)
Review: Group-IB Threat Intelligence & Attribution (TI&A)

Organizations and enterprises that care about business continuity should have an established security program that needs to be reviewed on a regular basis. One of the hardest …

Darren Siegel
Strong security starts with the strengthening of the weakest link: passwords

Darren Siegel is a cyber security expert at Specops Software. He works as a lead IT engineer, helping organizations solve complex challenges within IT security. In this …

Log4j
The Log4j debacle showed again that public disclosure of 0-days only helps attackers

On December 9, 2021, a (now deleted) tweet linking to a 0-day proof of concept (PoC) exploit (also now deleted) for the Log4Shell vulnerability on GitHub set the internet on …

shark
Should businesses be concerned about APT-style attacks?

As we enter 2022, organizations are re-evaluating their cybersecurity strategies to lower risks and best defend against potential threats. Through budget, risk tolerance, …

businessman
A CISO’s guide to discussing cybersecurity with the board

With data breaches on track to reach all-time high, chief information security officers (CISOs) are on alert to find blind spots in IT infrastructures and mitigate risks to …

ransomware
Businesses need to stop thinking that ransomware is different from other attacks

Organizations are in danger of allowing the spectre of ransomware attacks to distract them from keeping up with general security measures, according to SE Labs. The company …

hand
External attackers can penetrate most local company networks

In 93% of cases, external attackers can breach the organization’s network perimeter and gain access to local network resources, and it takes an average of two days to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools