Please turn on your JavaScript for this page to function normally.
password
The importance of secure passwords can’t be emphasized enough

Cybercriminals typically rely on weak passwords to break into online accounts of unsuspecting victims, which often leads to severe consequences. But despite understanding the …

Managing the Dynamic Nature of Cyber Security
Introducing the book: Managing the Dynamic Nature of Cyber Security

In order to provide organizations with knowledge to lower their cyber risk, Dr. Sander Zeijlemaker, launched his book – “Managing the Dynamic Nature of Cyber Security: A …

magnifying glass
Removing the blind spots that allow lateral movement

There are critical blind spots in most security solutions today that make it nearly impossible to detect and prevent lateral movement attacks. Understanding the fundamentals …

Office 365, Slack
How to prepare your organization for a Slack or Office 365 breach

Whether it’s Slack or Office 365, communication and workflow apps are an essential tool for organizations to collaborate efficiently regardless of geography. However, using …

Log4j
How to address the ongoing risk of Log4j exploitation and prepare for the future

“Vulnerable instances of Log4j will remain in systems for many years to come, perhaps a decade or longer,” the Cyber Safety Review Board (CSRB) has concluded. …

encryption
Q-Day: The problem with legacy public key encryption

In the power circles where policy and technology meet, there always seems to be someone with his or her “hair on fire” about some issue or another, and it can be difficult to …

data
The future of SOCs: Automation where it matters

Sophisticated attacks, remote work needs and rapidly changing technologies challenge organizations to manage IT security while containing costs and using overburdened staff. …

network
Conventional cybersecurity approaches are falling short

Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, variety, and velocity of …

Who are the best fraud fighters?

Seasoned fraud expert PJ Rohall has recently become the new Head of Fraud Strategy & Education at SEON. In this Help Net Security interview, he talks about how he entered …

shark
The enemy of vulnerability management? Unrealistic expectations

Organizations vary by size, industry, level of maturity, but one thing that they all have in common is needing to know how to quickly remediate security vulnerabilities. As an …

fist
Best practices for cyber resilience

Cyber resilience is a top priority for global organizations. Understanding threats plays a key role in building and maintaining a strong layered security approach, according …

organize
How to develop successful incident response plans

In this Help Net Security video, Neal Bridges, CISO at Query.AI, talks about the rules organizations need to think about if they way to develop successful incident response …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools