Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
healthcare data sovereignty
Protecting patient data starts with knowing where it’s stored

Patient data is often stored or processed outside the country where it was collected. When that happens, the data falls under the laws of the country where it resides. …

SAP
Why SAP security updates are a struggle for large enterprises

In this Help Net Security video, Jonathan Stross, SAP Security Analyst at Pathlock, examines why managing SAP security updates is so complex for enterprises. From highly …

governance
Rethinking governance in a decentralized identity world

Decentralized identity (DID) is gaining traction, and for CISOs, it’s becoming a part of long-term planning around data protection, privacy, and control. As more …

Interactive Brokers
Scammers are impersonating Interactive Brokers: Here’s what you need to know

Interactive Brokers is warning customers to be on high alert due to a wave of scams involving fraudsters posing as company representatives. Interactive Brokers (IBKR) is a …

Aaron McCray
CISO 3.0: Leading AI governance and security in the boardroom

In this Help Net Security interview, Aaron McCray, Field CISO at CDW, discusses how AI is transforming the CISO role from a tactical cybersecurity guardian into a strategic …

cybersecurity awareness
Security awareness training isn’t stopping breaches. Can AI help?

In this Help Net Security video, Mick Leach, Field CISO at Abnormal AI, explores why security awareness training (SAT) is failing to reduce human error, the top cause of …

Microsoft Exchange
Exchange 2016, 2019 support ends soon: What IT should do to stay secure

Microsoft is ending support for Exchange Server 2016, Exchange Server 2019, and Outlook 2016 on October 14, 2025. That date might seem far off, but if you’re managing email …

Ria Shetty
What CISOs can learn from the frontlines of fintech cybersecurity

At Span Cyber Security Arena, I sat down with Ria Shetty, Director, Cyber Security & Resilience for Europe at Mastercard. Our conversation cut through the hype and …

magnify
How to threat hunt Living Off The Land binaries

In this Help Net Security video, Lee Archinal, Senior Threat Hunter at Intel 471, walks through practical strategies for detecting malicious activity involving Living Off The …

remote worker
How well do you know your remote IT worker?

Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into companies around the world, gaining access to sensitive data. Recently, …

layoffs
Why layoffs increase cybersecurity risks

A wave of layoffs has swept through the tech industry, leaving IT teams in a rush to revoke all access those employees may have had. Additionally, 54% of tech hiring managers …

outsourcing cybersecurity
Outsourcing cybersecurity: How SMBs can make smart moves

Outsourcing cybersecurity can be a practical and affordable option. It allows small businesses to get the protection they need without straining their budgets, freeing up time …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools