Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
cloud
Where does corporate cloud security responsibility begin and service provider responsibility end?

Security has, is and will continue to be the cornerstone of advancement in the digital age. Conditions of trust, real or expected, are essential for digital economies to grow …

architecture
Automating the hunt for cyber attackers

In this podcast recorded at Black Hat USA 2017, Mike Banic, Vice President, Marketing, and Chris Morales, Head of Security Analytics at Vectra Networks, talk about the use of …

healthcare
Has healthcare misdiagnosed the cybersecurity problem?

Take a cursory look at the U.S. Department of Health and Human Services’ (HHS) wall of data breach shame and you might be scratching your head: Why does the healthcare sector …

woman
What leads women to cybersecurity, and what makes them stay?

Many studies have shown that different perspectives result in a better understanding of problems and, ultimately, in better solutions for everybody. But even though it’s …

cube
Identity-in-depth and the evolution of defense

We’ve seen it over and over again: the parade of companies and government agencies announcing the impact of their latest breach. These players have something in common that …

speed
Intrusion detection is speeding up: Is it enough to tackle global cyber threats?

As criminals continue to develop new methods to break or sidestep cyber defences, in many cases the focus is shifting towards the ability to detect and respond to an incident …

diver
Shark or not? 3 real-life security scenarios and how to tell which will really bite

We’ve just wrapped one of my favorite weeks of television, Shark Week. Viewers were treated to show after show of sharks stalking and attacking helpless victims. In most …

user
Most damaging threat vector for companies? Malicious insiders

According to a new SANS survey, 40 percent of respondents rated malicious insiders (insiders who intentionally do harm) as the most damaging threat vector their companies …

measure
Most companies fail to measure cybersecurity effectiveness

Thycotic released its first annual 2017 State of Cybersecurity Metrics Report which analyzes key findings from a Security Measurement Index (SMI) benchmark survey of more than …

hand
UK govt urges teenagers to apply for cyber security training programme

UK teenagers are being encouraged to register in a cyber security training programme rolled out to help the nation address the risk of a future skills shortage. The Department …

architecture
The future of AppSec: Stop fighting the last war

It’s a cornerstone of military doctrine: when you focus too much on the last battle you faced, you miss signs of the new battleground taking shape. The principle holds as true …

people
Addressing the deficit in cyber security workforce and national policy

Whether they like it or not, in this day and age nearly all organizations have to think about their cybersecurity posture and find a way to minimize cybersecurity risk. But …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools