Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
SASE
SASE or zero trust? Why security teams should be using both

As companies continue to navigate increasingly distributed environments, the question of zero trust is coming up more and more – as is the relationship between this …

Door
Encryption is either secure or it’s not – there is no middle ground

The principle of end-to-end encryption underpins a system of communication where only the communicating users can read the messages. To this end, it exists to prevent any …

identity theft
We must crush digital misinformation before it destroys society

Digital communication is connecting people around the globe with tremendous benefits, but is also being misused in terrible ways that take advantage of the community. We are …

tax season
Death, taxes, and hacks: How to prevent cyberattacks during tax season

Remember how folks did taxes in the olden days? They’d collect large piles of paper documents, fill out endless pages of forms, stuff a bunch of receipts in a shoebox and – …

risk
5 key cybersecurity risks in 2021, and how to address them now

With an unexpected year of massive change behind us, many organizations have now an extensive remote workforce, new technologies in use, and digital transformation under way …

captcha
Want to get around a CAPTCHA? That’ll be 0.00094c, please

Shopping or booking an appointment online can seem increasingly like busywork. Please prove that you’re not a bot: select all the photos that show traffic lights. Do some …

CI/CD pipelines
The growing threat to CI/CD pipelines

Before the pandemic, most modern organizations had recognized the need to innovate to support developers’ evolving workflows. Today, rapid digitalization has placed a …

user
3 steps to meeting data privacy regulation compliance through identity programs

Cybersecurity is undeniably a business-critical function. That’s only been reinforced over the past few months by the SolarWinds and Exchange attacks. Consequently, a recent …

keyboard
Digital dependence and innovation: Two critical trends in cyber espionage and crime

Being a veteran cybersecurity incident responder with over 21 years of field experience I know I will always have a job and it will always be interesting. In the evolution of …

arrows
Organizations suffer downtime despite following cybersecurity recommendations

Organizations continue to suffer downtime despite IT stacks equipped with all recommended cybersecurity technologies – including continuous data protection, anti-malware with …

zero
How to avoid 4 common zero trust traps (including one that could cost you your job)

Formulated by a research analyst over a decade ago, the zero-trust security model was embraced by thought leaders. And when Google, with its unlimited budget and resources, …

identity theft
Stop using your employees as scapegoats: Change their behavior

Remote workforces pose new challenges for organizations, with the largest issue centered around fortifying the security of at-home workers. We’ve recently witnessed large …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools