Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Is accessing work apps on the move destructive?

There’s a lack of mobile working policies can lead to destructive consequences for businesses, according to Ping Identity. On a regular basis, 44% of employees access up …

New regulation for ENISA, the EU cybersecurity agency

EU cybersecurity agency ENISA has received a new Regulation, granting it a seven year mandate with an expanded set of duties. ENISA’s Executive Director, Professor Udo …

Key obstacles to effective IT security strategies

Drawing on data gathered from a total of 3,037 individuals – 1,944 technicians and 1,093 executives – in the United States, Canada, United Kingdom, Australia, …

F-Secure advances fight against exploits

Exploitation of software vulnerabilities has become one of the most popular ways to gain access to users’ machines, but F-Secure is reinforcing its exploit defenses with …

U.S. tech companies sharing bug info with U.S. govt before releasing fixes

A recent report by Bloomberg’s Michael Riley has revealed that a great many U.S.-based companies are voluntarily sharing sensitive information with the U.S. national …

Guccifer hacks U.S. nuclear security agency chief

The hacker that goes by the online moniker “Guccifer” continues his crusade agains U.S. current and former government officials, and his latest victim is Neile …

Facebook, Microsoft and Apple disclose little on U.S. government data requests

The disclosure of details about the controversial PRISM program set up by the NSA has indubitably damaged the reputation of the companies involved in it, and some of them are …

British GCHQ spied on G20 delegates to gain advantage in talks

The British GCHQ has monitored computers and intercepted phone calls made by the foreign participants of two G20 summit meetings in London in 2009 and provided crucial …

Account takeover attempts have nearly doubled

ThreatMetrix announced its Cybercrime Index, a series of Web fraud data aggregated from 1,500 customers, 9,000 websites and more than 1.7 billion cyber events. In a recent …

It takes 10 hours to identify a security breach

Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee. The ability to detect data breaches within …

Cisco teams with IBM, Lancope, LogRhythm, Splunk and Symantec

Cisco introduced new developments with security partners and information-sharing techniques under its Cisco Security Technology Partner Ecosystem. Enabled by a new context …

Secure automated archiving from Imation

Imation launched its next generation object store, the Nexsan Assureon secure automated archive solution. It brings secure automated archiving to mid-sized organizations and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools