Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
paint
Businesses are forced to adopt new cybersecurity measures

Eighty five percent of US and UK employers were forced to adopt new cybersecurity measures because of the COVID-19 pandemic and the shift to remote working, according to a …

zero
Operational technology and zero trust

Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …

finance
Shrinking cyber budgets are leaving businesses at risk

The cyber budgets of enterprises rose by less than 1% during the pandemic, according to their cyber budget holders. This left cyber spend stagnating at an average of around …

Shark
When cybersecurity becomes terrifying

Some cybersecurity horror stories are not your typical horror stories: there’s no danger from a chainsaw-wielding maniac hiding behind a server rack, the Candyman won’t appear …

shield
When it comes to securing systems against quantum computers, there is no one-size-fits-all solution

Quantum computers will rapidly solve complex mathematical problems. This includes the ability to break both RSA and ECC encryption in seconds. In response, NIST has been …

industry
Industrial cybersecurity market to reach $22.3 billion by 2026

The global market for industrial cybersecurity estimated at $15.2 billion in the year 2020, is projected to reach a revised size of $22.3 billion by 2026, growing at a CAGR of …

collaboration
Eliminate cyber friction with smarter technology

In modern organizations, it’s natural for there to be some friction between cybersecurity teams and employees. While the cybersecurity teams defends the …

DDoS
DDoS attacks were a more serious threat in Q3 2021 than ever before

Link11 has released new data from its network on the development of the DDoS threat: The number of attacks remains at a very high level in Q3 2021. After Q2 2021 had already …

Dependency Combobulator
Dependency Combobulator: Open source toolkit to combat dependency confusion attacks

Apiiro released Dependency Combobulator, a modular and extensible open source toolkit to detect and prevent dependency confusion attacks. The toolkit, available on GitHub, …

bomb
Most CIOs and CISOs underestimate the risk of an OT breach

A research study by Skybox Security found that 83% of organizations suffered an operational technology (OT) cybersecurity breach in the prior 36 months. The research also …

data
Most cybersecurity leaders use microsegmentation to augment corporate network security

In today’s era of remote employees and an ever expanding variety of connected devices, network security is becoming increasingly complex. To compensate, cybersecurity …

Why are we still asking KBA questions to authenticate identity?

Do you remember the name of your second-grade teacher? How about your maternal grandfather’s middle name? If you’ve ever forgotten a password, you’ve no doubt experienced the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools