Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
biohazard
Nearly 40% of new ransomware families use both data encryption and data theft in attacks

Data-stealing ransomware attacks, information harvesting malware, and supply chain attacks are among the critical threats to organizations, according to F-Secure. One of the …

Trend Micro oil and gas industry
Lack of IT-OT collaboration holding back smart factory security projects

61% of manufacturers have experienced cybersecurity incidents in their smart factories and are struggling to deploy the technology needed to effectively manage cyber risk, …

person
Board directors need to play an active role in protecting their org from cyber risks

Cybersecurity failure is a “clear and present danger” and critical global threat, yet responses from board directors have been fragmented, risks not fully understood, and …

identity theft
Stop using your employees as scapegoats: Change their behavior

Remote workforces pose new challenges for organizations, with the largest issue centered around fortifying the security of at-home workers. We’ve recently witnessed large …

shield
Why certificate automation is no longer just “nice to have”

We’ve all heard the shocking stories about the outages at what should have been bullet-proof organizations like Microsoft, Spotify, and a California Covid-19 testing …

find
Challenges and benefits of using threat data feeds

Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from the Ponemon Institute. As cyberthreats proliferate, many …

network
Using memory encryption in web applications to help reduce the risk of Spectre attacks

There’s nothing quite like an actual proof-of-concept to make everyone listen. I was pleased by the PoC released by Google security engineers Stephen Röttger and Artur Janc …

hands
Distributed and remote work creating a perfect storm for network security teams

Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a FireMon research has found. The survey of 500 cybersecurity …

fist
What businesses need to know to evaluate partner cyber resilience

Many recent high-profile breaches have underscored two important cybersecurity lessons: the need for increased scrutiny in evaluating access and controls of partners handling …

Fraud losses
Total combined fraud losses climbed to $56 billion in 2020

While total combined fraud losses climbed to $56 billion in 2020, identity fraud scams accounted for $43 billion of that cost. Traditional identity fraud losses totaled $13 …

identity theft
Remote workers admit to playing a significant part in increasing their company’s cybersecurity risks

The COVID-19 generation of remote workers are admitting to playing a significant part in increasing the cybersecurity risks facing their companies. An Opinium research shows …

Work
IT leaders adapting to new challenges by prioritizing collaboration, cloud and security

CIOs and IT decision makers (ITDMs) are looking to maximize investments and drive innovation after a difficult year which raised the profile of IT leaders in driving critical …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools