Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
analyst
The CISO as brand enabler, customer advocate, and product visionary

Just over a quarter-century ago, the first Chief Information Security Officer (CISO) was minted in the financial vertical, and everyone lived happily ever after. The End. If …

virtual reality
Extended Threat Intelligence: A new approach to old school threat intelligence

The world is shaken by different new crises and cyber events every day. All sectors are affected by the events, either in terms of production, transportation, or security. The …

handshake
How to build a security tool that sells

In my experience as a CISO in the industry, as well as in my current position as CISO-in-Residence at YL Ventures, an early-stage, cybersecurity-focused venture capital firm, …

shark
Are you willing to take a calculated risk? Quantifying your cyber risk and predicting future threats

We can all agree that cyber attacks are inevitable. The next step for cybersecurity professionals is reaching a consensus on the best way to prepare for unknown threats …

Bronwyn Boyle
Women in cybersecurity: How far have they come?

In this interview with Help Net Security, Bronwyn Boyle, CISO at Mambu, talks about women in cybersecurity, what are the hurdles they must overcome in their career, and how …

healthcare
How to keep your medical device IP safe from cyber attacks

Guarding intellectual property (IP) has always been a priority for medical device manufacturers as competitors and even nation states are constantly trying to compromise or …

tools
How to empower IT Sec and Ops teams to anticipate and resolve IT problems

Every IT system administrator knows the misery of facing a problem for which the root cause requires hours (and sometimes days) to unearth, all the while part of the IT …

healthcare
Help Net Security: Healthcare Cybersecurity Report has been released

Our newest report takes a closer look at one of the most targeted industries today – healthcare. As exhausted healthcare professionals struggle with an extraordinary …

CIS
How configuration assessments help improve cyber defenses

There’s an old adage in business; if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security …

CIS Elements
3 key elements of a strong cybersecurity program

The world relies on technology. So, a strong cybersecurity program is more important than ever. The challenge of achieving good cyber hygiene can be especially acute for …

Malcolm Harkins
How to measure security efforts and have your ideas approved

In this interview with Help Net Security, Malcolm Harkins, Chief Security & Trust Officer, Epiphany Systems, talks about the challenges security leaders must face when …

Group-IB Threat Intelligence & Attribution (TI&A)
Review: Group-IB Threat Intelligence & Attribution (TI&A)

Organizations and enterprises that care about business continuity should have an established security program that needs to be reviewed on a regular basis. One of the hardest …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools