Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
5G
Where is 5G heading, and how fast will it get there?

When it comes to 5G, carriers are optimistic. In fact, more than half of those surveyed by Dimensional Research expect to deliver substantial end-user benefits within two to …

tools
Microsoft releases one-click Exchange On-Premises Mitigation Tool

Microsoft has released Exchange On-Premises Mitigation Tool (EOMT), which quickly performs the initial steps for mitigating the ProxyLogon flaw (CVE-2021-26855) on any …

network
Securing a hybrid workforce with log management

Moving to a remote workforce in response to the pandemic stay-at-home orders meant that IT departments needed to address new risks, e.g., insecure home networks. However, as …

Cybersecurity risk management
Risk management in the digital world: How different is it?

Managing risk arising from remote work has largely been reactive, and risk managers have had to adapt to new digital threats that weren’t necessarily as prevalent when work …

magnifying glass
If you are not finding vulnerabilities, then you are not looking hard enough

Building security and privacy into products from concept to retirement is not only a strong development practice but also important to enable customers to understand their …

Security threats increasing with 70% using personal devices for work

Samsung has revealed the results of a multi-industry research study, which identifies the main technology challenges UK businesses have faced over the last year – and the key …

signal
Global WLAN market revenue continues to increase

Worldwide revenue for the combined consumer and enterprise WLAN market segments increased 17.9% year over year in the fourth quarter of 2020 (4Q20) and grew 10.3% for the full …

Microsoft Exchange
As attacks on Exchange servers escalate, Microsoft investigates potential PoC exploit leak

Microsoft Exchange servers around the world are still getting compromised via the ProxyLogon (CVE-2021-26855) and three other vulnerabilities patched by Microsoft in early …

lock
Password reuse defeats the purpose of passwords

When a person reuses the same password across multiple accounts, one account’s exposure puts all the others at risk. To prevent this, cybersecurity awareness programs must …

face
Why data privacy will be the catalyst for digital identity adoption

Most of us probably don’t think of buying a bottle of wine as a security risk. However, we inadvertently give away our address, surname, nationality and signature – …

identity theft
Alarming number of consumers impacted by identity theft, application fraud and account takeover

A new report, developed by Aite Group, and underwritten by GIACT, uncovers the striking pervasiveness of identity theft perpetrated against U.S. consumers and tracks shifts in …

connection
How digital leaders built a foundation for resiliency in the face of disruption

During the past year, digital leaders deployed a remote workforce, engaged customers via contactless delivery and weathered various business disruptions throughout the year. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools