Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Solving the portable data security headache

Protecting intellectual property and sensitive information is a major security concern for any business today – especially against the backdrop of workers needing to …

Networkless working: The future of the public sector?

It is no secret that the UK Government is still running at a significant loss. It is therefore no surprise that organisations are having to cut costs, and for the public …

Preparing for your first security breach

So you’ve finally accepted it’s just a matter of time before you experience your first major breach. Despite all the work you’ve put in to your monitoring …

Fast and furious reverse engineering

Tomislav Pericin is one of the founders of ReversingLabs and the company’s Chief Software Architect. In this video, recorded at Hack in The Box Amsterdam 2012, he talks …

Proactive or reactive: Should that be the question?

For a number of years digital forensics has referred to “the application of computer investigation and analysis techniques to gather evidence suitable for presentation …

BYOD 2.0 and spotting the next big trend

In the 1960s and 70s the IT department was seen as a secret place ruled by powerful niche experts. They had total control of the department and who could access systems. The …

From identity and access solutions to access governance

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of …

Automated hacking

The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An …

Provisioning is not access governance

Organizations of all sizes face ever-stricter regulatory and security requirements to protect their data, and that of their customers. But user provisioning systems alone …

Raising user awareness about privacy issues

In this age of social networks, discovering personal information about users has become increasingly easy to do, and that information can be misused at a later date for …

The evolving nature of hacktivism

A recent Anonymous video admits that they’ve been fairly quiet lately. From an American and Western European perspective, this is somewhat true. In 2010, Anonymous built …

10 steps to ensure users only access what they need

Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools