Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
Women CIOs report higher IT budget increases than their male counterparts

In 2014, female CIOs expect to increase their IT budgets 2.5 percent, whereas male CIOs report an average increase of 0.2 percent, according to a survey by Gartner, Inc. The …

What keeps senior IT security pros up at night? It’s not what you think

In the security space, last year was one for the books. Edward Snowden made waves after leaking classified documents detailing government surveillance programs, which raised …

Responding to data breaches and increasing security

In this podcast, recorded at Infosecurity Europe 2014, Josie Herbert interviews Craig Carpenter, the Chief Cybersecurity Strategist for AccessData. Carpenter tackles the …

EU Data Protection Regulation: Detection is the best prevention

The UK government recently published guidelines for companies covering the five basic controls that businesses must follow to ensure a minimum level of protection. The goal of …

Embedding positive security behaviors is essential

Organizations have spent millions over recent decades on information security awareness activities. The rationale behind this approach was to take their biggest asset – …

CISOs anxious about possible data breaches, employees not so much

If you are a Chief Information Security Officer, chances are you may not be getting much sleep lately according to a recent survey of IT security executives at companies of …

Six infosec tips I learned from Game of Thrones

In Westeros—the land of dark knights, backstabbing royals, dragons, wildings, wargs, red witches, and White Walkers—even the youngest ones have to learn basic self-defense …

Passwords: Real-world issues, tips and alternatives

Per Thorsheim is an independent information security adviser based in Norway. He is the founder and main organizer of PasswordsCon, the first and only international conference …

Working to accomplish compliance and security

Organizations have until January 2015 to meet the new requirements of the PCI Data Security Standard version 3.0. Businesses need to ensure that compliance is cyclical and …

Learning from others

The old saying “one man’s misfortune is another man’s gain” is eminently applicable in the information security industry. When an organization becomes …

How can we create a culture of secure behavior?

It’s a busy day in your company and everyone is rushing around trying to respond to requests. Audrey gets an email that looks like it’s from a partner asking her …

CyberRX: Healthcare industry’s first cyber attack simulation

HITRUST, in coordination with the U.S. Department of Health and Human Services (DHHS), revealed the results of the healthcare industry’s first cyber attack simulation, …

Don't miss

Cybersecurity news