Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Business
Your board and cyber risk: Reimagining security protocols from the top down

As scrutiny of well-known financial services firms’ security practices continues to make news, the SEC has chosen to turn its attention to risks facing a certain subset of the …

deep web
The history of cyber attacks: From ancient to modern

In the 1990s, your typical hacker’s approach used to be “hit-and-run”, and in many cases it was about fame and recognition. Back in those days most organizations only had a …

data
Most large organizations will have a Chief Data Officer by 2019

The race to drive competitive advantage and improved efficiency through better use of information assets is leading to a sharp rise in the number of chief data officers …

Abstract
A possible future for IoT security

There are many problems with Internet of Things devices, and security is one of the biggest ones. To serve as an example of this important issue, two researchers from …

wire
There’s no turning back: Say goodbye to the perimeter

If you’ve been following the announcements from this year’s Consumer Electronics Show is Las Vegas, you couldn’t have missed Ford’s partnership announcement with Amazon. …

payment data security
The dismal state of payment data security

With acceptance of mobile and other new forms of payments expected to double in the next two years, a new global study shows a critical need for organizations to improve their …

rise
Data security advances on the corporate agenda

Glasswall Solutions issued its top five predictions for 2016. “We believe the next 12 months will see some of the most significant developments in the history of cyber …

Doctor
Cybersecurity recommendations for medical device manufacturers

Cybersecurity threats to medical devices are a growing concern. The exploitation of cybersecurity vulnerabilities presents a potential risk to the safety and effectiveness of …

sign
Good practice guide on disclosing vulnerabilities

ENISA published a good practice guide on vulnerability disclosure, aiming to provide a picture of the challenges the security researchers, the vendors and other involved …

Money
Worldwide IT spending outlook for 2016

Worldwide IT spending is forecast to total $3.54 trillion dollars in 2016, just a 0.6 percent increase over 2015 spending of $3.52 trillion dollars, according to Gartner, Inc. …

user
Endpoint security really can improve user experience

Traditional security policies are intrusive and impact user productivity. This is unfortunately the opinion of most end users. In fact, according to a recent study performed …

Internet
Unexpected implications arising from the Internet of Things

More than half of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by 2020, according to Gartner. The impact of the IoT …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools