Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
certificates
Apple’s 45-day certificate proposal: A call to action

In a bold move, Apple has published a draft ballot for commentary to GitHub to shorten Transport Layer Security (TLS) certificates down from 398 days to just 45 days by 2027. …

video data breaches
Identity-related data breaches cost more than average incidents

Identity-related data breaches are more severe and costly than run-of-the-mill incidents, according to RSA. 40% of respondents reported an identity-related security breach. Of …

Carla Roncato
Simplifying decentralized identity systems for everyday use

In this Help Net Security interview, Carla Roncato, VP of Identity at WatchGuard Technologies, discusses how companies can balance privacy, security, and usability in digital …

identity
Unlocking the value of AI-powered identity security

While most organizations are still in the early horizons of their identity security journey, those who achieve maturity are seeing disproportionately higher returns for every …

identity
The role of self-sovereign identity in enterprises

As personal data becomes increasingly commodified and centralized, the need for individuals to reclaim control over their identities has never been more urgent. Meanwhile, …

John Yeoh
Securing non-human identities: Why fragmented strategies fail

In this Help Net Security interview, John Yeoh, Global VP of Research at CSA, discusses the growing security challenges posed by non-human identities (NHIs). With NHIs now …

email
Organizations are making email more secure, and it’s paying off

Compromised identities have been a central component of countless costly breaches this year, according to Red Canary. Rise in identity and cloud-native attacks While most of …

identity risks
Rising identity security risks: Why organizations must act now

As the priority for managing digital identities intensifies, organizations are encountering severe identity security risks. Recent findings indicate that many businesses are …

keys
Gateways to havoc: Overprivileged dormant service accounts

Service accounts are non-human identities used to automate machine-to-machine interactions. They support critical functions – such as running scripts, services, and …

eyes
Organizations still don’t know how to handle non-human identities

Organizations are grappling with their current NHI (non-human identities) security strategies, according to Cloud Security Alliance and Astrix Security. The high volume of …

identity
How CISOs enable ITDR approach through the principle of least privilege

Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. …

digital identity
Fighting AI-powered synthetic ID fraud with AI

Aided by the emergence of generative artificial intelligence models, synthetic identity fraud has skyrocketed, and now accounts for a staggering 85% of all identity fraud …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools