Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
risk
Businesses are ignoring third-party security risks

In the dynamic business landscape where third-party relationships assume a critical role, organizations confront various risks that can profoundly affect their security and …

connections
Employees worry less about cybersecurity best practices in the summer

IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely, …

AI
Popular generative AI projects pose serious security threat

Many popular generative AI projects are an increased security threat and open-source projects that utilize insecure generative AI and LLMs also have poor security posture, …

Dennis Fridrich
Preparing health systems for cyber risks and insurance coverage

Our healthcare systems are at risk of infiltration by threat actors, potentially disrupting services, compromising sensitive data, and even jeopardizing patient outcomes. …

IT professional
Economic volatility drives businesses to MSPs

The current economic conditions are leading companies of all sizes to reassess their operations and business strategies to remain competitive and profitable, according to …

BEC scams
Widespread BEC attacks threaten European organizations

European organizations experienced a greater volume and frequency of BEC attacks over the last year, as compared to organizations in the United States, according to Abnormal …

zero trust
Operationalizing zero trust in the cloud

Some organizations have bought into the idea that workloads in the cloud are inherently more secure than those on premises. This idea is reinforced by the concept that the …

cybersecurity investments
Security investments that help companies navigate the macroeconomic climate

As data transformation progresses, cyber attacks are among the most significant growing threats to the enterprise. As seen in the recent MOVEit situation, enterprises must …

open source security
Cloud-native security hinges on open source

Technologies like Kubernetes and K3S are synonymous with the success of cloud native computing and the power of open source. It is no accident they have steamrolled the …

Georgia Bafoutsou
Unraveling the multifaceted threats facing telecom companies

In today’s interconnected world, telecom companies serve as gateways, connecting individuals, businesses, and governments. However, this role also makes them prime …

money
Increased spending doesn’t translate to improved cybersecurity posture

Security teams are stretched, with not enough people, skills or budget to cope with all their priorities, according to Panaseer. Average cybersecurity budgets increase in 2023 …

container
How to create SBOMs for container images

The importance of software bills of materials (SBOMs) has grown substantially in recent years as organizations recognize the need for greater transparency in the software …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools