Help Net Security
![network](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104720/network-400x200.jpg)
Stealth network traffic analysis appliance automates defense actions
LookingGlass Cyber Solutions announced at RSA Conference 2018 the general availability of the LookingGlass IRD-100 (Intelligence Response and Deception) security appliance. …
![CoSoSys](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101327/CoSoSys-400x200.jpg)
In preparation for the GDPR, CoSoSys launches Endpoint Protector 5.1
CoSoSys announced the latest update of its award-winning flagship Data Loss Prevention product, Endpoint Protector 5.1, which brings added functionalities to key features and …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105950/artificial_intelligence-400x200.jpg)
Open-source library for improving security of AI systems
IBM researchers have created the Adversarial Robustness Toolbox, an open-source library to help researchers improve the defenses of real-world AI systems. Attacks against …
![Anomali](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114018/anomali-400x200.jpg)
Anomali partners with Visa to offer global payment breach intelligence
Threat management and collaboration solutions provider Anomali announced a partnership with Visa to provide cyber security teams with intelligence on indicators of compromise …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103547/general-400x200.jpg)
Infrastructure-agnostic web app protection with virtual patching option
Signal Sciences announced the latest innovations for its Web Protection Platform. Its patented architecture provides security, operations and development teams with the …
![crypto currency](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101455/crypto_currency2-400x200.jpg)
Cryptominers displace ransomware as the number one threat
During the first three months of 2018, cryptominers surged to the top of detected malware incidents, displacing ransomware as the number one threat, Comodo’s Global …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102804/hands-400x200.jpg)
Top tech firms pledge not to help governments launch cyberattacks
34 global technology and security companies have pledged not to aid governments launch cyberattacks and to protect all customers regardless of nationality, geography or attack …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101310/innovation-sandbox-twitter-400x200.jpg)
Photo gallery: RSA Conference 2018 Innovation Sandbox
The RSA Conference 2018 is underway at the Moscone Center in San Francisco. Here are a few photos from the Innovation Sandbox, where the 10 finalists – Acalvio Technologies, …
![Anomali](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101329/Anomali-400x200.jpg)
Anomali collaborates with Microsoft to integrate threat data
Threat management solutions provider Anomali announced a collaboration with Microsoft to integrate threat intelligence from the Anomali ThreatStream platform with the security …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101313/cio-ciso-exchange-courtot-400x200.jpg)
Photo gallery: CIO/CISO Interchange inaugural event
CIO/CISO Interchange, a new non-profit, non-commercial organization co-founded by Philippe Courtot, Chairman & CEO, Qualys, and the Cloud Security Alliance (CSA) was …
![mask](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105808/mask-400x200.jpg)
Researchers develop algorithm to detect fake users on social networks
Ben-Gurion University of the Negev and University of Washington researchers have developed a new generic method to detect fake accounts on most types of social networks, …
![work](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103241/work-400x200.jpg)
Tech-skilled cybersecurity pros in high demand and short supply
The worldwide cybersecurity skills gap continues to present a significant challenge, with 59 percent of information security professionals reporting unfilled cyber/information …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes