Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
paint
Businesses are forced to adopt new cybersecurity measures

Eighty five percent of US and UK employers were forced to adopt new cybersecurity measures because of the COVID-19 pandemic and the shift to remote working, according to a …

digital transformation
Digital transformation spending to reach $2.8 trillion in 2025

Global spending on the digital transformation (DX) of business practices, products, and organizations is forecast to reach $2.8 trillion in 2025, more than double the amount …

Zoom
Zoom patches vulnerabilities in its range of conferencing apps

Zoom has patched vulnerabilities in its range of local solutions for conferences, negotiations and recordings – Zoom Meeting Connector Controller, Zoom Virtual Room …

see
We need a Cyber Awareness Century

For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are still very unequipped to handle the internet’s …

zero
Operational technology and zero trust

Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …

gears
How do I select a policy automation solution for my business?

Organizations nowadays have to meet a growing number of regulatory, compliance and legal requirements. The more complex an organization is, the more time consuming these …

finance
Shrinking cyber budgets are leaving businesses at risk

The cyber budgets of enterprises rose by less than 1% during the pandemic, according to their cyber budget holders. This left cyber spend stagnating at an average of around …

industry
Cultural divide between IT and OT teams leaves 65% of organizations unable to secure both environments

Only 21% of organizations have achieved full maturity of their ICS/OT cybersecurity program, in which emerging threats drive priority actions and C-level executives and the …

magnifying glass
Internal audit leaders expect new risks to emerge post-pandemic

COVID-19 stretched organizational resources and unleashed new risks on a global basis, prompting an ongoing pivot by internal audit departments to address the evolving …

5G
5G and edge computing will lead an app development revolution

A ResearchAndMarkets report evaluates the outlook for 5G technology, infrastructure, devices, applications, and services. The report also assesses the technologies, …

chip
Intel chip flaw could enable attacks on laptops, cars, medical devices (CVE-2021-0146)

Researchers uncovered a vulnerability in Intel Processors that could affect laptops, cars and embedded systems. The flaw (CVE-2021-0146) enables testing or debugging modes on …

Shark
When cybersecurity becomes terrifying

Some cybersecurity horror stories are not your typical horror stories: there’s no danger from a chainsaw-wielding maniac hiding behind a server rack, the Candyman won’t appear …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools