Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
industry
Data-driven analysis of vulnerabilities in real-world OT networks

Operational Technology (OT) networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and …

cloud
Cloud security today: Complexity, compliance, and containerization

An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the …

virtual reality
Immersive technologies are game changers for cybersecurity job growth

A new ESG study, which surveyed more than 500 people aged 16 to 24, revealed that 74% of respondents said the use of VR tools would increase their likelihood of pursuing …

find
The impact of threat hunting on your security operations

The main goal of threat hunting is to find traces attackers have left behind in the organization’s IT environment. These traces can date back to already solved crises or …

access
The 10 misconceptions of using a policy-based approach for access control

The principle of Attribute Based Access Control (ABAC) has existed for many years. It’s the evolution from simple access control lists and role-based access control, to a …

analyst
Infosec shouldn’t eat their own, we’re better than this

Security teams the world around are putting in hours every day to keep their company’s most prized assets secure. These are professionals that have spent considerable time …

stop
Business suffers as over-zealous security tools block legitimate work

Most security teams utilise a ‘prohibition approach’ – i.e. restricting user access to websites and applications – a tactic which is hampering productivity and innovation …

gap
Another KRACK in the network perimeter

When a high profile vulnerability surfaces that is as far reaching as KRACK, a WPA2 encryption attack to hijack Wi-Fi networks, it’s common to respond impulsively. “Why are …

transformation
Digital skills gap: The biggest hindrance to addressing cybersecurity?

Although businesses recognize the importance of digital transformation, organizations worldwide are struggling to balance the elements needed to deliver on digital. Of 1,625 …

Businessman juggling
Should non-security functions get more involved in cybersecurity?

According to a survey conducted by Dimensional Research, 100 percent of respondents believe soft skills are important when hiring for their security teams. The three most …

transform
Digital transformation and the loss of security control

Unpatched web infrastructure and de-centralised web management practices are leaving UK organisations vulnerable to cyber-attacks and high profile data breaches. New RiskIQ …

stock price
Digital transformation, regulations impacting data security decisions at financial organizations

Almost half (49%) of global financial services organisations have experienced a data breach in the past, according to the 2017 Thales Data Threat Report, Financial Edition. …

Don't miss

Cybersecurity news