Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
transform
The price of an accelerated digital transformation

F5 announced a report which shows the challenges organizations face as they transform IT infrastructures to deliver and secure digital services that have become inseparable …

week in review
Week in review: Attackers exploiting VMware RCE, Microsoft fixes actively exploited zero-day

Here’s an overview of some of last week’s most interesting news, articles and interviews: Microsoft fixes actively exploited zero-day reported by the NSA (CVE-2022-24521) On …

Identity issues: Lagging cybersecurity investments are creating cybersecurity debts

A report released by CyberArk indicates that 79% of senior security professionals state that cybersecurity has taken a back seat in the last year in favor of accelerating …

person
Confessions of a CTO

Chief technology officers (CTOs) are typically juggling the joint responsibility of maintaining the organization’s overarching technology infrastructure and enabling business …

person
Unmanaged and unsecured digital identities are driving rise in cybersecurity debt

A global report released by CyberArk shows that 79% of senior security professionals state that cybersecurity has taken a back seat in the last year in favor of accelerating …

Kali Linux
Advance your penetration testing skills by mastering Kali Linux

In this video for Help Net Security, Vijay Kumar Velu, Technical Director for Offensive Security and DFIR at BDO UK, talks about his latest book: Mastering Kali Linux for …

hands
Dark data is a pain point for many security leaders

BigID published a research report exploring today’s challenges organizations face with protecting their most valuable data. The study uncovered a number of critical findings: …

Consumer trust is in the doldrums: Indifference towards data exposure is widespread

Imperva has published findings from a global study on consumer perceptions of data privacy and trust in digital service providers. The results suggest that consumers feel …

cloud
Top attack techniques for breaching enterprise and cloud environments

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors to compromise critical assets in …

cloud
The two words you should never forget when you’re securing a cloud

When cloud providers sell their services, they know their customers are thinking about cybersecurity – that’s why providers tend to tout their impressive accreditations …

npm
New npm flaws let attackers better target packages for account takeover

In this video for Help Net Security, Yakir Kadkoda, Lead Security Researcher, and Assaf Morag, Lead Data Analyst at Aqua Security, talk about new npm flaws that allow …

hardware security
A robust security strategy starts with the hardware

Intel released the results of a study exploring how organizations approach security innovation in an increasingly digital world to stay ahead of the evolving threat landscape. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools