Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
qualys cloud agent platform
Qualys Cloud Platform offers two new disruptive services

Qualys announced a major expansion of its Qualys Cloud Platform. New services include File Integrity Monitoring (FIM) and Indicators of Compromise (IOC) detection solutions …

Eyes
Targeted attack prevention in cloud email and messaging systems

GreatHorn announced the launch of the GreatHorn Threat Platform (GTP) at RSA Conference 2017. The Threat Platform extends the capabilities of the company’s cloud-native …

people
U.S. consumers’ views on cybersecurity

To better understand how Americans think about hacker motivations, consumer versus business security responsibilities, ransomware and the political climates impact on the …

Hands
Cybersecurity training management and skills assessment platform

No cost and open source cybersecurity massive open online course (MOOC) provider Cybrary announced the launch of its Teams training management and skills assessment platform …

IoT
Security programs not keeping up with IoT threats

More than 90 percent of IT security professionals said that connected devices will be a major security issue this year. However, 66% aren’t sure how many devices are in their …

users
Qualys and Bugcrowd bring automation, crowdsourcing to web app security

At RSA Conference 2017, Qualys and Bugcrowd announced joint development integrations allowing joint customers the ability to share vulnerability data across automated web …

Cybereason platform
Cybereason unveils complete next-generation endpoint platform

Cybereason unveiled a new Endpoint Security Platform that includes next-generation antivirus (NGAV) functionality at RSA Conference 2017 in San Francisco. By integrating …

Magnify
25% of web apps still vulnerable to eight of the OWASP Top Ten

69 percent of web applications are plagued by vulnerabilities that could lead to sensitive data exposure, and 55 percent by cross-site request forgery flaws, the results of a …

data
Metadata: The secret data trail

Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …

bomb
Top phishing targets in 2016? Google, Yahoo, and Apple

For every new phishing URL impersonating a financial institution, there were more than seven impersonating technology companies. Comparison of most impersonated companies …

Abstract
InfoArmor VigilanteATI: Threat intelligence from the Dark Web

InfoArmor has expanded its global customer base in the enterprise and SME/SMB sector with its award-winning VigilanteATI Advanced Threat Intelligence Platform and …

Easy Solutions dashboard
Easy Solutions launches digital threat protection suite

Today at RSA Conference 2017 in San Francisco, Easy Solutions unveiled its Digital Threat Protection suite. The offering enables organizations with a proactive strategy …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools