Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
users
A continuous problem: Tackling the cybersecurity skills shortage

We have read the over abundance of apocalyptic articles covering the growing talent shortage in cybersecurity. But buried under the hyperbolic numbers, there is a larger and …

email
Researchers develop machine learning-based detector that stops lateral phishing attacks

Lateral phishing attacks – scams targeting users from compromised email accounts within an organization – are becoming an increasing concern in the U.S. Whereas in …

fix
Employees know vulnerabilities exist, but they can’t resolve them quickly enough

There is a sharp remediation gap between when organizations first detect vulnerabilities and when those issues are ultimately resolved, Adaptiva survey reveals. The survey …

spotlight
The digital economy is approaching a critical tipping point

As the current decade comes to an end, the digital economy is approaching a critical tipping point. By 2023, the global economy will finally reach “digital …

Phishing
Europol: Spear phishing the most prevalent cyber threat affecting orgs across the EU

Spear phishing describes the practice of targeting specific individuals within an organisation or business for the purposes of distributing malware or extracting sensitive …

hands
People are the very first element in a pragmatic cybersecurity strategy

39 percent of cybersecurity and IT executives indicate their company is under-prepared to handle a data breach and 66 percent prefer negotiating with a used car salesperson …

Microsoft
Organizations fail to maximize use of Microsoft 365 security features

While the majority of IT decision makers (88 percent) say they have ‘fully deployed’ Microsoft 365 in their organization, most have yet to adopt the software suite to its …

Cybersecurity risk management
Companies should disclose cybersecurity risk management efforts

Research finds that when one company experiences a cybersecurity breach, other companies in the same field also become less attractive to investors. However, companies that …

mobile work
Risky transactions on mobile devices increase 138% since 2017

Risky transactions on mobile devices are showing an increase of 138% since 2017, iovation survey of 802 consumers from the United Kingdom and 802 consumers from the United …

biohazard
Keeping up with the evolving ransomware security landscape

Cybercrime is ever-evolving, and is consistently becoming more effective and damaging. While the range of attack vectors available to malicious actors are vast, ransomware …

money
Security services and network security still top spending priorities for CISOs in MENA

Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019, according to …

containers
Container usage has grown in complexity, specific security controls are needed

Container usage has grown in scale and complexity, and doubled in density, according to Sysdig. As container technologies continue to transform how organizations deliver …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools