Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
How employees put your company at risk during the holidays

Most enterprises of any significant size have implemented security training programs, designed to teach employees how to avoid major security risks – phishing attacks …

HIPAA security compliance: How risk tolerant are you?

At the heart of HIPAA lies a set of core security tenets for which every affected organization is responsible. These fundamentals are absolutely non-negotiable – but the …

Why now is the time for enterprises to implement context-based authentication

Security and efficiency are constant concerns in enterprise IT. The popularity of BYOD has been a boon for improved productivity and collaboration, but it has also created a …

Cloud security: Do you know where your data is?

The rapid move towards virtualization and cloud infrastructure is delivering vast benefits for many organizations. In fact, Gartner has estimated that by 2016, 80% of server …

Big Data analytics to the rescue

In the battle against cyber criminals, the good guys have suffered some heavy losses. We’ve all heard the horror stories about major retailers losing tens of millions of …

When should unauthorized computer access be authorized?

Recently, the decentralized hacktivist collective, Anonymous, launched an attack campaign called Operation KKK (#OpKKK), targeting the racist hate group called the Klu Klux …

Negotiating privacy in the age of Big Data

The promise of the Big Data revolution is all around us – improving our quality of life and providing us with new insights in culture, science, economics, and …

Software security in a market for lemons

There is little doubt that it’s difficult to develop secure software. First, you need to be aware of the need for security, accepting it as an important element of …

Protecting your child’s digital identity

Each day, as infosec professionals, we dedicate ourselves to protecting our client’s most valuable assets. We spend countless hours focused on keeping data, intellectual …

Top 3 security, privacy and data protection trends for 2015

2014 was full of front page stories about data privacy, hacks, data jurisdiction and other threats that confirmed security is no longer a niche. Security is officially a …

Improving your readiness for OCR audits

In the wake of healthcare data breaches, OCR audits for HIPAA compliance have become more common – and the consequences have been more highly publicized. But many …

What to expect in the unpredictable world of IT security?

2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools