Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
fix
We can’t wait for SBOMs to be demanded by regulation

Old ads can be startling—cigarette ads used to boast their health-giving properties, sugar-laden candy was once advertised as a dietary aid, and soft drinks were advertised as …

Bhagwat Swaroop
Navigating the ever-changing landscape of digital security solutions

Recently, Entrust named Bhagwat Swaroop as President, Digital Security Solutions. In this role, Bhagwat will lead the evolution, growth, and expansion of the Entrust Digital …

Europe
EU cyber resilience regulation could translate into millions in fines

The EU Commission’s Cyber Resilience Act (CRA) is intended to close the digital fragmentation problem surrounding devices and systems with network connections – from …

cube
The cybersecurity industry will undergo significant changes in 2023

The cybersecurity industry will undergo some significant changes in 2023. As more systems get connected, we can expect to see more outages. We probably won’t see a …

lock
Privacy concerns are limiting data usage abilities

Access to data is significantly limited by data privacy and protection regulations, according to a survey conducted by Bloor Research. The report reveals that 60% of the data …

approved
7 reasons why you must embed trust into the core of your business

As organizational trust becomes a top priority for companies of all sizes and industries, a new OneTrust report highlights seven key industry trends relevant to privacy, …

check
Cybersecurity engineering under the Federal Trade Commission

When the Federal Trade Commission (FTC) releases new regulations or changes to existing ones, the implications may not be obvious to the average business or company employees. …

compliance
Compliance initiatives can advance your organization’s security journey

Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at …

shield
Does your company need secure enclaves? Five questions to ask your CISO

Some of the biggest barriers to cloud adoption are security concerns: data loss or leakage, and the associated legal and regulatory concerns with storing and processing data …

hospital
Don’t wait for medical device cybersecurity legislation: Act now to save patients’ lives

Cyberattacks can cost lives — especially in the healthcare sector. Nearly a quarter of healthcare providers victimized by ransomware reported increased mortality rates …

data
How serious are organizations about their data sovereignty strategies?

Scality announced the results of an independent survey of IT decision makers across France, Germany, the UK, and the US about their data sovereignty strategies. 98% of …

The challenges of achieving ISO 27001

ISO 27001 is a widely-known international standard on how to manage information security. In this Help Net Security video, Nicky Whiting, Director of Consultancy, Defense.com, …

Don't miss

Cybersecurity news