Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
puzzle
Components of an effective vulnerability management process

Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data …

abstract
Making security a high priority may not lead to improved measures

Technology professionals see many steps that could be taken to improve their company’s security. Just over half of the 500 security professionals surveyed by CompTIA say …

LightCyber
Who’s next? Shift focus and detect network attackers

Who will be the victim of the next major breach? Nearly all enterprises and organizations are sitting ducks for a targeted network attack. Maybe it’s time to take some …

What’s driving security budgets and technology purchases?

IT security and IT leaders and their staff members do not agree on security objectives, according to findings from a new global Ponemon study.One of the key findings from the …

CISO challenges and security ROI

Mark Brown is the Director of Information Security at EY. In this interview he offers guidance for CISOs, discusses the technical competence of company leaders, tackles …

Key security metrics revealed

A new Ponemon Institute study examined the key risk-based security metrics IT security managers used most frequently to gauge the effectiveness of their organizations’ …

Metrics: Valuable security indicator or noise?

Many organizations believe that IT, and by association IT security, is a wasted expense. They recognize that the financial investment needs to be made but few truly understand …

Security metrics are too complicated for senior executives

Tripwire announced the results of research on the state of risk-based security management with the Ponemon Institute. Key findings include: 75% of respondents say metrics are …

Security Metrics, A Beginner’s Guide

Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of …

Chrome is the most secure browser, claims new study

Microsoft’s Internet Explorer does a better job protecting systems from attackers who already have gained some degree of access than Mozilla’s Firefox, and …

An epidemic of security worst practices

The majority of organizations fail to adhere to simple data protection standards and, in many cases, are fully unaware of what security practices are currently in place, …

Comparative risk benchmarking service

Invictis launched its Risk Score service (IRS), a comparative risk benchmarking service which generates a security profile of the enterprise. Offered in three incremental …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools