Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
bulb
New infosec products of the week: June 28, 2019

Elastic SIEM: Speed, scale, and analytical power drive your security operations and threat hunting The initial launch of Elastic SIEM introduces a new set of data integrations …

cloud
Over reliance on public cloud vendor security puts data and companies at risk of breach

As global organizations increasingly move critical applications, regulated customer data and development work into public cloud environments, 36 percent say the number one …

city
Interoperability and security remain critical factors in any smart city deployment

Smart cities are expected to be commonplace within the next 10 years, according to a new poll by Wi-SUN Alliance. Over half of respondents expect to see widespread smart city …

Cisco DCNM
Cisco plugs critical security holes in Data Center Network Manager

Cisco has plugged four security holes in its Data Center Network Manager, two of which critical (have a 9.8 CVSS score). About Cisco Data Center Network Manager Cisco Data …

geometry
When it comes to cybersecurity, perfection is the enemy of progress

In information security, perfection is the enemy of progress, says Lenny Zeltser, VP of Product at Axonius. But it’s one thing to know about this maxim, and another to …

question
Where are organizations stalling with cybersecurity best practices?

UK organizations are failing to make progress towards strong cybersecurity and are facing paralysis as cybercriminals become more advanced, according to NTT Security. …

hand
Threat actors are doing their homework, researchers identify new impersonation techniques

There is an increase in three main areas: spoofed phishing attempts, HTTPS encryption in URL-based attacks, and cloud-based attacks focused on publicly hosted, trusted …

biohazard
Anatomy of a ransomware attack: How attackers gain access to unstructured data

Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and …

eye
Organizations need greater visibility into network activity

One of the biggest challenges for all organizations was a lack of agility, making it difficult for their teams to investigate and respond quickly and accurately to security …

professional
Finding skilled pros remains a challenge, cloud and security in high demand

Tech teams will continue to grow in the second half of the year, but finding the right talent won’t be easy, according to Robert Half Technology’s State of U.S. …

Microsoft OneDrive
Microsoft OneDrive users get an even more secure Personal Vault

Microsoft has announced that, by the end of the year, all users of its OneDrive cloud storage service will get a Personal Vault, which will provide added protection for …

G Suite
Google delivers new G Suite security tools

Google has announced several new security tools for G Suite admins and users, as well as a new 2FA option: one-time security codes based on security keys. Email security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools