Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
breach
Full recovery from breaches takes longer than expected

In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated …

backup
Five backup lessons learned from the UnitedHealth ransomware attack

The ransomware attack on UnitedHealth earlier this year is quickly becoming the healthcare industry’s version of Colonial Pipeline, prompting congressional testimony, lawmaker …

Stephanie Domas
Debunking myths about open-source security

In this Help Net Security interview, Stephanie Domas, CISO at Canonical, discusses common misconceptions about open-source security and how the community can work to dispel …

DNS
Safeguarding the DNS through registries

The integrity of our online ecosystem heavily relies on domain registries, which serve as the foundation for secure and trusted digital experiences. However, threats like …

teamwork
Dev + Sec: A collaborative approach to cybersecurity

The age-old tension between development and security teams has long been a source of friction in organizations. Developers prioritize speed and efficiency, aiming to deliver …

Riaz Lakhani
Why AI alone can’t protect you from sophisticated email threats

In this Help Net Security interview, Riaz Lakhani, CISO at Barracuda Networks, discusses the effectiveness of AI-based behavioural analysis in combating sophisticated email …

open-source password managers
Open-source and free Android password managers that prioritize your privacy

We’re often told to use strong, unique passwords, especially for important accounts like email, banking, and social media. However, managing different passwords for numerous …

Google
Google report shows CISOs must embrace change to stay secure

Google’s latest report, conducted in partnership with Hypothesis Group, reveals a stark reality for organizations: incremental security measures are no longer …

compliance
Navigating the compliance labyrinth: A CSO’s guide to scaling security

Imagine navigating a labyrinth where the walls constantly shift, and the path ahead is obscured by fog. If this brings up a visceral image, you’ve either seen David Bowie’s …

Stuart McClure
Transforming code scanning and threat detection with GenAI

In this Help Net Security interview, Stuart McClure, CEO of Qwiet AI, discusses the evolution of code scanning practices, highlighting the shift from reactive fixes to …

insider threat
Evaluating GRC tools

According to Gartner, the broad range of pricing for government, risk, and compliance (GRC) tools requires enterprise risk management (ERM) leaders to be well-versed in …

Report cybercrime
How and where to report cybercrime: What you need to know

Cybercrime reporting mechanisms vary across the globe, with each country offering different methods for citizens to report cybercrime, including online fraud, identity theft, …

Don't miss

Cybersecurity news