Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
person
Humans are becoming the primary security risk for organizations around the world

With an unprecedented number of employees now working in hybrid or fully remote environments, compounded by an increase in cyber threats and a more overwhelmed, COVID-19 …

chip
The first formal verification of a prototype of Arm CCA firmware

As our personal data is increasingly used in many applications from advertising to finance to healthcare, protecting sensitive information has become an essential feature for …

industry
Industrial cybersecurity leaders are making considerable headway

Increased cyber threats and government directives have made cybersecurity a top priority among critical infrastructure organizations. A zero trust security architecture is the …

encryption
Q-Day: The problem with legacy public key encryption

In the power circles where policy and technology meet, there always seems to be someone with his or her “hair on fire” about some issue or another, and it can be difficult to …

lock
Outsourcing security is the only solution for many smaller teams

Companies with small security teams continue to face a number of distinctive challenges that place these organizations at greater risk than larger enterprises, according to …

endpoint protection
Businesses are adding more endpoints, but can’t manage them all

Most enterprises struggle to maintain visibility and control of their endpoint devices, leading to increased security breaches and impaired ability to ward off outside …

network
Conventional cybersecurity approaches are falling short

Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, variety, and velocity of …

Who are the best fraud fighters?

Seasoned fraud expert PJ Rohall has recently become the new Head of Fraud Strategy & Education at SEON. In this Help Net Security interview, he talks about how he entered …

organize
How to develop successful incident response plans

In this Help Net Security video, Neal Bridges, CISO at Query.AI, talks about the rules organizations need to think about if they way to develop successful incident response …

ImmuniWeb Neuron
Product showcase: ImmuniWeb Neuron, DAST with a zero false positives SLA

Few organizations can afford regular penetration testing of their numerous web applications, APIs and microservices. Instead, they usually leverage a fully automated web …

Dealing with threats and preventing sensitive data loss

Recently, Normalyze, a data-first cloud security platform, came out of stealth with $22.2M in Series A funding. This was the perfect time to catch up with co-founder and CEO …

patch
July 2022 Patch Tuesday forecast: A summertime lull?

June 2022 Patch Tuesday wrapped up a few loose ends we were waiting on. The Follina remote code execution vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT) …

Don't miss

Cybersecurity news