Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
circle
The influence of the Agile Manifesto, 20 years on

On 11th February 2001, many software delivery thought leaders came together in Snowbird, Utah, to discuss how to create processes that can enable enterprises to continuously …

network
Securing a hybrid workforce with log management

Moving to a remote workforce in response to the pandemic stay-at-home orders meant that IT departments needed to address new risks, e.g., insecure home networks. However, as …

Cybersecurity risk management
Risk management in the digital world: How different is it?

Managing risk arising from remote work has largely been reactive, and risk managers have had to adapt to new digital threats that weren’t necessarily as prevalent when work …

lock
Password reuse defeats the purpose of passwords

When a person reuses the same password across multiple accounts, one account’s exposure puts all the others at risk. To prevent this, cybersecurity awareness programs must …

face
Why data privacy will be the catalyst for digital identity adoption

Most of us probably don’t think of buying a bottle of wine as a security risk. However, we inadvertently give away our address, surname, nationality and signature – …

backup
Two new ways backup can protect enterprise SaaS data

Software-as-a-Service (SaaS) apps are a treasure trove of information. They’re where business takes place and decisions get made, so it’s not surprising that they’re …

data
Compromised devices and data protection: Be prepared or else

The January 6 riot and storming of the U.S. Capitol demonstrated just how quickly and unexpectedly our devices can fall into the wrong hands. The allegation that one rioter …

cloud
Passing a compliance audit in the cloud doesn’t have to be hard

Companies are required to comply with regulations that set standards specific to financial and size thresholds, industry type, customer categories, or other parameters. But …

cloud
How to mitigate security risks as cloud services adoption spikes

Millions have flocked to video-conferencing solutions and organizations have relied more heavily on various applications (such as G Suite for end users, Azure for developers, …

tunnel
Keeping your serverless architecture secure

Serverless architecture empowers organizations to build and deploy software at scale without in-house servers. The prevalence of Function-as-a-Service (FaaS) models like …

brain
Starting your cybersecurity career path: What you need to know to be successful

As COVID-19 spread across the world, organizations found themselves more exposed to cyber threats than ever before and the cybersecurity skills gap became even more obvious. …

security awareness
Security awareness programs: The difference between window dressing and behavior change

CISOs are responsible for pursuing cybersecurity purchases that align with the overall health of their organizations. All investments must drive tangible value and ROI while …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools