Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
person
CIOs are apprehensive about interruptions due to expired machine identities

TLS certificates act as machine identities, safeguarding the flow of sensitive data to trusted machines. With the acceleration of digital transformation, the number of machine …

Broken glass
40% of security pros say half of cyberattacks bypass their WAF

There are growing concerns around the number of businesses vulnerable to cyberattacks due to hackers’ ability to bypass their Web Application Firewall (WAF), Neustar reveals. …

ransomware
Ransomware attacks are increasing, do you have an emergency plan in place?

39% of organizations either have no ransomware emergency plan in place or are not aware if one exists. This is despite more ransomware attacks being recorded in the past 12 …

risk
Organizations need an agile response to unexpected risks

The average $5 billion company incurs delays of roughly 5 weeks per year in new product launches due to missed risks, with a $99 million opportunity cost, according to …

risk
Realizing cybersecurity risks does not mean sticking to the rules

72% of remote workers say they are more conscious of their organization’s cybersecurity policies since lockdown began, but many are breaking the rules anyway due to limited …

Snyk
New vulnerabilities in open source packages down 20% compared to last year

New vulnerabilities in open source packages were down 20% compared to last year suggesting security of open source packages and containers are heading in a positive direction, …

drown
SOC team members battle with burnout, overload and chaos

While some organizations have increased security operations center (SOC) funding, the overall gains have been meager, and the most significant issues have not only persisted, …

Bugcrowd
Study of global hackers and the economics of security research

Human ingenuity supported by actionable intelligence were found to be critical ingredients to maintaining a resilient infrastructure, Bugcrowd reveals. In fact, 78% of hackers …

colors
Employees often overlooked when companies adopt new technology

Companies are placing business and shareholder goals above employee needs when they adopt new technology, according to Lenovo. The research, conducted among 1,000 IT managers …

person
Consumer security concerns at an all-time high, but priorities have shifted

31% of Americans are concerned about their data security while working from home during the global health crisis, according to a Unisys Security survey. Consumer security …

architecture
Business functions fail to collaborate on digitization

Many companies do not realize the full value of investing in digital projects due to a lack of collaboration among their critical business functions, according to a study by …

privacy
Companies are rethinking their approach to privacy management

TrustArc announced the results of its survey on how organizations are protecting and leveraging data, their most valuable asset. The survey polled more than 1,500 respondents …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools