Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Keeping college networks secure

Morris Altman is the Director of Network Services and Internet Security Officer at Queens College, a senior college of the City University of New York. Queens College is the …

Breaking the security of physical devices

In this podcast recorded at Black Hat USA 2014, Silvio Cesare, Director of Anti-Malware Engineering at Qualys, discusses the security measures of a number of household devices …

Is your encryption getting out of control?

2014 marks the 25th anniversary of the creation of the World Wide Web. From its earliest beginnings, users have demanded security for their sensitive information and web sites …

Continuous monitoring for your perimeter

Qualys Continuous Monitoring is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they …

API security for connecting the enterprise cloud

In this interview, Don Bergal, COO at Managed Methods, answers questions regarding security around API based connections between an enterprise and the hybrid cloud. What …

The dangers of backdoor passwords

In an increasingly connected world, backdoor passwords have large implications on the Internet of Things, the medical world and industrial control systems. While you might …

A walk through Black Hat USA 2014

Here’s a walk through video of the Business Hall at Black Hat USA 2014. The video features: Qualys Firemon iBoss Crowdstrike Palo Alto Networks Shape Security Pwnie …

Detect and respond

At a recent security and risk management conference I had an opportunity to talk with industry analysts about today’s challenges in network security. It seems that many …

The art and science of detecting emerging threats

In this interview, Stephen Huxter, COO at Darktrace, talks about the challenges involved in detecting emerging threats, Recursive Bayesian Estimation, the evolution of AI, and …

iOS security myths and threats

In this interview, Zuk Avraham, CEO of Zimperium, talks about iOS security myths and threats, discusses the difficulties in exploring iOS security vs. “breaking” …

How secure are today’s critical networks?

In this interview, Dr. Lutz J?¤nicke, CTO at Innominate Security Technologies, illustrates the security of critical networks, the regulatory mandates for organizations in the …

The role of the cloud in the modern security architecture

In this interview, Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools