Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
macOS High Sierra
The future of macOS security: Baked-in protection and third-party tools

Anyone in the information security industry who’s interested in Mac security probably knows who Patrick Wardle is. Apart from being Chief Security Researcher at Synack, …

magnifying glass
The role of web filtering in a modern security architecture

In its most basic and simplest form, filtering access to content on the web can be achieved by rather blunt instruments such as DNS black-holes. And, in the early 2000s, this …

GDPR
Why companies shouldn’t dread the advent of GDPR

The main aim of the General Data Protection Regulation (GDPR) is to make sure that the data of EU citizens is protected, no matter where it’s held. The regulation, which will …

architect
What’s an IT architect, and could you become one?

If you’re a Computer Science student or an IT professional looking for a new job that’s interesting, well paid, and for which demand is constant, you might want to …

cube
Software security assurance: Everybody’s invited

As more and more things in this world of ours run on software, software security assurance – i.e. confidence that software is free from vulnerabilities (either …

Businessman
Security awareness is good, but good security culture is better

As an efficient mechanism to influence employee behavior, security culture is one of the most important, yet most overlooked, aspects of organizational security. “A …

spotlight
Executive spotlight: iovation’s new Vice President of Product

Last week iovation announced that Dwayne Melancon was leaving Tripwire after 17 years and joining the company as the new Vice President of Product, so we decided to get in …

Wi-Fi
Lure10: Exploiting Wi-Fi Sense to MITM wireless Windows devices

Karma has long been a staple man-in-the-middle attack used in authorised wireless security assessments and unsanctioned ones, but as many modern operating systems now provide …

chess
Deception security doesn’t have to be onerous or expensive

When talking about deception security, most infosec pros’ mind turns to honeypots and decoy systems – additional solutions that companies have to buy, deploy, and …

Machine learning in information security: Getting started

Machine learning (ML) technologies and solutions are expected to become a prominent feature of the information security landscape, as both attackers and defenders turn to …

woman
Women in infosec: Real-life experiences and challenges

In all segments of society and business, minorities encounter problems that the majority rarely or never faces. And information security is – I think we can all agree …

kaspersky Lab KIPS
Cybersecurity gamification: A shortcut to learning

Cybersecurity awareness trainings are usually a boring affair, so imagine my colleagues’ surprise when I exited the room in which I participated in a demonstration of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools