Please turn on your JavaScript for this page to function normally.
open source security
What closed-source software developers can learn from their open-source counterparts

Open-source software has reached greater levels of security than ever before, but its increased adoption comes with new challenges. In this Help Net Security video, Josep …

Facepalm
Medibank hack turned into a data breach: The attackers are demanding money

Medibank, Australia’s largest private health insurance provider, has confirmed that last week’s “cyber incident” has resulted in a data breach. …

phishing
How phishing campaigns abuse Google Ad click tracking redirects

PhishLabs by HelpSystems has identified attackers leveraging a weakness in Google’s ad service to carry out phishing campaigns on financial institutions. In this Help Net …

Chris Konrad
Want to be a CISO? Being technical is just one of the requirements

As data breaches’ financial and reputational costs continue to reach new heights, cybersecurity should be on top of mind for leadership across every industry. Recent …

security awareness
Upgrade your security awareness efforts: Here’s how to start

October is Security Awareness Month, an exciting time as organizations around the world train people how to be cyber secure, both at work and at home. But what exactly is …

healthcare
7 critical steps to defend the healthcare sector against cyber threats

While knowing full well that human lives may be at stake, criminal gangs have been increasingly targeting the healthcare sector with high-impact attacks like ransomware. 1. …

deepfakes
Deepfakes: What they are and how to spot them

The term “deepfake” is used for photo, video or audio content that has been manipulated to make it seem that the subject is doing or saying something they never did or said. …

risk
Economic uncertainty is increasing cybersecurity risks

Cybercriminals are always seeking to make their attacks, scams and campaigns as effective as possible. This includes harnessing whatever is dominating the news agenda and is …

shield
Security stack consolidation helps CISOs lower cybersecurity spending

In this Help Net Security video, Alfredo Hickman, Head of Information Security at Obsidian Security, discusses the importance of security stack consolidation for organizations …

healthcare
Cost-effective steps healthcare CISOs can take to mitigate damaging attacks

Cybersecurity measures are increasingly failing to close gaps, and the healthcare industry, in particular, has become a high-dollar target due to limited budgets and quick …

lock
How government organizations can stay steps ahead of attackers

Attacks against governments are nothing new. They have been an interesting target since they have existed, for the mere reason that not everyone agrees on how things are run. …

complex
Purpose-based access control: Putting data access requests into context

Access control is the heart of data protection. Striking the right balance between easy access and tight security isn’t easy, but getting it right is how you maintain business …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools