Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Best practices for ensuring compliance in the age of cloud computing

When was the last time you heard someone utter the sentence, “I’m looking forward to the audit next week.” Most likely, never. Since its invention, the word “audit” has struck …

Why collaboration is crucial in the battle for IT security

Guy Wertheim, the CTO at Comilion, talks about the importance of collaboration and data sharing in the battle for increased security. Modern organizations are tackling a …

Should a data breach be the kiss of death for the CEO?

The fact that CEOs have tendered their resignations in the aftermath of public breaches is a clear indication that the executive level is being held more accountable for the …

How data breaches are changing information security

In this podcast recorded at Black Hat USA 2015, Gautam Aggarwal, Chief Marketing Officer at Bay Dynamics, takes a look at the past year in the security space and the important …

Who’s afraid of shadow IT?

One of the biggest disruptions in the IT world is the quantity and quality of SaaS tools. From email and storage, to phone systems and infrastructure, it has never been easier …

CPU hardware performance counters for security

In this podcast recorded at Black Hat USA 2015, Nishad Herath, Principal Anti-Malware Technologist at Qualys, talks about CPU hardware performance counters, which allow us to …

The WhatsApp of Wall Street

On August 21, a pump and dump penny stock scam targeting US users, and spread using WhatsApp, drove the share price of Avra Inc, a digital currency company, by 640% from its …

Proactive real-time security intelligence: Moving beyond conventional SIEM

Surprisingly, discussions about security intelligence still focus primarily around conventional reactive Security Incident and Event Management systems (SIEM). However, in …

Protect against privileged credential attacks with zero trust

Enterprise networks – and the attacks against them – have evolved. No longer static, they are dynamic entities. And yet, IT organizations continue to use traditional security …

The big picture of protecting and securing Big Data

Today almost every company is dealing with big data in one way or another – including customer data, tracking data, and behavioral marketing information – connecting every …

Effective security starts with UX

There’s an unfortunate disconnect between the priorities of security teams and where they’re investing their time, focus, and budget. The recent 2015 Black Hat Attendee Survey …

Open source auditing with Lynis

Lynis is an open source security auditing tool. Commonly used by system administrators, security professionals and auditors, to evaluate the security defenses of their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools