Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
What’s the state of your software?

Cybercrime is felt by businesses up and down the country, with the Information Security Breaches Survey (ISBS) reporting that 81 per cent of large and 60 per cent of small …

Sun Tzu 2.0: Is cyberwar the new warfare?

For better or worse, the multitude of networks that help keep our world interconnected is a much different place today than it was in the past. Paradoxically, the networks …

Breaches might be inevitable, but penalties are not harsh enough

A panel on the topic of data breaches organized by cyber security and penetration testing company Cognosec has revealed that most industry professionals believe that breaches …

Automated threat management: No signature required

The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists …

The challenges of implementing tokenization in a medium-sized enterprise

We have seen a concerning pattern in the recent data breaches, including the breach at the Internal Revenue Services (IRS) and other US government agencies in that the primary …

Do CISOs deserve a seat at the leadership table?

A ThreatTrack security survey of C-level executives at U.S. enterprises employing a CISO found that despite a rash of high-profile data breaches in the last year, many in the …

Information security governance practices are maturing

Information security governance practices are maturing according to Gartner’s annual end-user survey for privacy, IT risk management, information security, business …

How to apply threat intelligence feeds to remediate threats

IT organizations are recognizing the value of threat intelligence feeds, and that’s good. Threat intelligence is a must-have for identifying malware and other threats that …

Are IT pros overconfident in their ability to deflect attacks?

IT executives within critical infrastructure organizations see a need for public-private threat intelligence sharing partnerships (86% of respondents) to keep pace with …

Unsharing in the sharing economy

It’s been a big year for the sharing economy. Numerous consumer services have skyrocketed to popularity by basing their business on the sharing of resources. Companies like …

CFOs are not confident about their level of security

CFOs’ long-term outlook for the North American economy remains strong despite their weakening confidence in their own companies’ prospects, according to Deloitte. Lower …

The difficult task of meeting compliance needs

Compliance is a complex issue in many industries and organizations know all too well that there are major fines and potential punishments for not meeting the laws and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools