Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Cyber operational readiness and a complex threat landscape

Mike Walls is the Managing Director, Security Operations and Analysis at EdgeWave. In this interview he discusses keeping pace with an increasingly complex threat landscape, …

Are IT security pros optimistic or naïve?

Half of IT security practitioners in the U.S. view their organization as an unlikely target for attack, according to a Ponemon Institute survey of 614 IT security …

What should companies do after a wide-scale data breach?

It is not always possible to prevent such attacks, however, it is possible to make them highly unlikely to succeed. It is also possible to limit the extent of possible damage …

Wargame teaches senior leaders about strategic threats and risks

On Oct. 13 Booz Allen and the FC2 held a cybersecurity wargame simulation for senior officials in the public and private sectors at the University of South Florida, the home …

Wargame teaches senior leaders about strategic threats and risks

On Oct. 13 Booz Allen and the FC2 held a cybersecurity wargame simulation for senior officials in the public and private sectors at the University of South Florida, the home …

How boards calibrate strategy and risk

Corporate boards are deepening their involvement in company strategy and refining their oversight of the critical risks facing the company, according to a recent global survey …

Cyber liability insurance is becoming an increasing necessity

According to Ken Westin, senior security analyst at Tripwire, cyber liability insurance is becoming an increasing necessity for businesses and could easily become a …

Companies investing in cloud, security and Big Data are growing faster

Organizations actively using cloud, mobility, big data or security technologies are experiencing up to 53 percent higher revenue growth rates than those that have not invested …

Secure networks are the key to unlocking A2P potential

75% of mobile network operators (MNOs) do not have the measures in place to control and monetize Application-to-Person (A2P) SMS traffic that traverses their network, …

Internet of Things: Connecting the security dots from application design to post-sale

The age of Internet of Things is upon us. While it’s still early days, Gartner predicts that by 2020, the Internet of Things will be made up of 26 billion connected devices …

Don’t sink your network

Too many of today’s networks are easy to sink. One attack pierces the perimeter, and all of the organisation’s most sensitive data comes rushing out. Soon after, their logo is …

Top strategic IT predictions for 2016 and beyond

Gartner’s top predictions for 2016 look at the digital future, at an algorithmic and smart machine-driven world where people and machines must define harmonious …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools