Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Dear CSO, do you know how to build security culture?

What do you really know about security culture? I am going out on a limb here and claim you know very little, if anything at all. Your day job is about security, and like most …

Hacking a smart lightbulb system

The phenomenon of the Internet of Things (IoT) is positively influencing our lives by augmenting our spaces with intelligent and connected devices. Examples of these devices …

Exploring critical infrastructure security and government cyber security

Chris Folk is the Director of National Protection Portfolio, The MITRE Corporation. Folk oversees work program development and delivery to: the DHS National Protection and …

Key cloud computing trends and enterprise security

Dan C. Marinescu is the author of Cloud Computing: Theory and Practice. He was a Professor of Computer Science at Purdue University in West Lafayette, Indiana from 1984 till …

Defending against the BREACH attack

When Juliano and Thai disclosed the CRIME attack last year, it was clear that the same attack technique could be applied to any other compressed data, and compressed response …

A question of trust

Trust is the foundation for many of our relationships, both in our personal and business life. Trust is one of the strongest elements supporting a relationship and helps it …

Metrics: Valuable security indicator or noise?

Many organizations believe that IT, and by association IT security, is a wasted expense. They recognize that the financial investment needs to be made but few truly understand …

Trust me with your secrets

For little over a month, revelations about NSA wiretapping schemes have been hitting the news and and rattling the world. The fact that the NSA has access to so much data …

Mobile operating system wars: Android vs. iOS

When we introduced Clueful for Android, we thought mobile users should know what the applications on their devices were doing. One year and a couple hundred thousand analyzed …

UEFI secure boot: Next generation booting or a controversial debate

One of the first initiatives for secure booting has been the Unified Extensible Firmware Interface (UEFI) Initiative. UEFI is a superior replacement of the Basic Input Output …

Selecting a cloud provider starts with exit planning

Let’s begin with a story: The first day of the new week started very ordinarily and nothing indicated this was going to be a very long and tiring day for Sarah, a CIO of …

Dissecting operation Troy: Cyberespionage in South Korea

When reports of the Dark Seoul attack on South Korean financial services and media firms emerged in the wake of the attack on March 20, 2013, most of the focus was on the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools