Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
CTO insights: Defending your organization from insider attacks

If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received …

Why you should steer users towards less predictable passwords

As users are instructed to create ever more complex passwords, and developers are starting to use encryption methods more difficult to crack than standard hashing functions, …

The value of patching and how to do it properly

Patching has been the stalwart of the information security community for at least the last 15 years. In this podcast recorded at RSA Conference 2015, Wolfgang Kandek, CTO at …

light
Planning for the Internet of Things

As organizations plan for the future, and how security has to operate within their business, they now have to worry about the Internet of Things (IoT). There’s a clear …

Webroot
Smarter threats and the rising complexity of cybercrime

85,000 new malicious IPs are launched every day, and the top phishing targets are technology companies and financial institutions, the new Webroot 2015 Threat Brief reveals. …

One-in-four Americans victimized by information security breaches

One-in-four Americans (25 percent) fell victim to information security breaches in the past year, according to a new survey from the American Institute of CPAs (AICPA), which …

London
IoT creates new set of risks, orgs embrace active defense

If the past 12 months saw a dramatic increase in data breach activity, then the year ahead promises to bring an entirely new set of concerns – and a shift in how companies are …

Binary
Security guidance for early IoT adopters

The Internet of Things (IoT) provides new and enhanced capabilities across diverse industries and enterprise functions, as well as unique security challenges associated with …

Consumers think passwords are of no value to criminals

21 percent of respondents to a Kaspersky survey assume their passwords are of no value to criminals. Many often take the easy way out when creating and storing passwords. For …

The key challenges to timely incident response

Security professionals are inundated with security incidents, averaging 78 investigations per organization in the last year, with 28 percent of those incidents involving …

CoinVault ransomware: Retrieve data without paying the criminals

Victims of the CoinVault ransomware have a chance to retrieve their data without having to pay the criminals, thanks to a repository of decryption keys and a decryption …

The need for end-user visibility in a Bring Your Own Anything environment

Mobiles, tablets, PCs, applications, cloud services – employees are increasingly bringing non-company devices into their organizations and connecting them to everything …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools