Português - Portugal
Latest information security news and research from Help Net Security
Help Net Security weekly newsletter
View in your browser
For a limited time, (ISC)2 is offering an Express Online Learning Bundle at significantly reduced pricing. Keep cybersecurity skills sharp with 12 months of access for only $324 – a $3,400 value!
How Hoxhunt minimizes cybersecurity risks from human error
Odix is disarming the growing malware threat
Five best practices for achieving and maintaining SOC 2 compliance
New infosec products of the week: April 24, 2020
Client-side web security
Work-from-home creates multitude of opportunities for leaks
The true costs incurred by businesses for technology downtime
Web shell malware continues to evade many security tools
Phishers exploiting employees’ layoff, payroll concerns
Let’s be realistic about our expectations of AI
Massive work-from-home movement exposes cybersecurity weaknesses
Google unveils secure remote access service to unburden enterprise VPNs
With a transition to remote work, network visibility becomes more critical than ever
Bad bot traffic increases, comprising almost one quarter of all website traffic
Application performance becoming a key concern, influenced by increasing SD-WAN complexity
Try the (ISC)2 Utilizing Big Data course – a $200 value – for FREE!
Update MS Office, Paint 3D to plug RCE vulnerabilities
Multiple vulnerabilities discovered in smart home devices
Five contingency best practices for SOCs to handle uncertainty
Foiling content-borne attacks against a remote workforce
Review: Cybersecurity – Attack and Defense Strategies
Are businesses prepared for a surge in cybercrime and fraud?
What is the impact of AI and ML tools on cybersecurity?
CISOs: Quantifying cybersecurity for the board of directors
Top threat detection trends and challenges for cybersecurity professionals
46% of SMBs have been targeted by ransomware, 73% have paid the ransom
Phishers exploit Zoom, WebEx brands to target businesses
COVID-19 affects web traffic and attack trends
Multi-cloud key management and BYOK
Understanding web security solutions
Starbleed vulnerability: Attackers can gain control over FPGAs
Average bandwidth of DDoS attacks increasing, APIs and applications under attack
Does working remotely actually work?
Handbook: Cyber-Risk Oversight 2020
Copyright © 2020 Help Net Security, All rights reserved.
Want to change how you receive these emails?
update your preferences
unsubscribe from this list