Please turn on your JavaScript for this page to function normally.
SEC
5 resolutions to prepare for SEC’s new cyber disclosure rules

2023 has been marked as a year of global conflict and unrest, all of which will impact the cyber threat landscape for years to come. However, one of the most significant cyber …

J. Wolfgang Goerlich
Strategies for cultivating a supportive culture in zero-trust adoption

In this Help Net Security interview, Wolfgang Goerlich, Advisory CISO at Cisco, discusses the benefits of implementing a mature zero-trust model for both security and business …

money
Stop panic buying your security products and start prioritizing

As 2024 is rounding the corner, many companies are making a fresh start with a new cybersecurity budget. But with the growing number of cyberattacks and their increasingly …

Anna Pobletts
How passkeys are reshaping user security and convenience

In this Help Net Security interview, Anna Pobletts, Head of Passwordless at 1Password, talks about passkey adoption and its acceleration in 2024. This trend is particularly …

software
Why it’s the perfect time to reflect on your software update policy

The threat landscape is evolving by the minute, with both malicious actors and well-intentioned researchers constantly on the hunt for new attack vectors that bypass security …

Eddie Zhang
Vulnerability disclosure: Legal risks and ethical considerations for researchers

In this Help Net Security interview, Eddie Zhang, Principal Consultant at Project Black, explores the complex and often controversial world of vulnerability disclosure in …

EU
NIS2 and its global ramifications

The Network and Information Systems Directive (NIS2), due to come into effect in October 2024, seeks to improve cyber resilience in the European Union (EU). Its effects are …

CISO
CISOs can marry security and business success

With an endless string of cyber fires to be put out, it’s easy to forget that the cybersecurity function in an organization doesn’t exist in a vacuum. Its main purpose is to …

cyber war readiness
Why cyber war readiness is critical for democracies

Once the war in Ukraine ends, Russia’s offensive cyber capabilities will be directed towards other targets, Rik Ferguson, VP Security Intelligence for Forescout, …

lock
Crypto asset discovery and the post-quantum migration

Quantum computing is reshaping our world and will revolutionize many industries, including materials science, life sciences, transportation, and energy. Google recently …

Peter Kaloroumakis
Modeling organizations’ defensive mechanisms with MITRE D3FEND

Funded by the National Security Agency, MITRE’s D3FEND framework is helping to provide standardization, specificity, and repeatability needed by cybersecurity engineers. As …

4 warning signs that your low-code development needs DevSecOps

Low code platforms have democratized development in the enterprise. They improve efficiency and enable companies to do more with less. But as you begin to do more you will …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools