Help Net Security
Metadata: The secret data trail
Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …
Top phishing targets in 2016? Google, Yahoo, and Apple
For every new phishing URL impersonating a financial institution, there were more than seven impersonating technology companies. Comparison of most impersonated companies …
InfoArmor VigilanteATI: Threat intelligence from the Dark Web
InfoArmor has expanded its global customer base in the enterprise and SME/SMB sector with its award-winning VigilanteATI Advanced Threat Intelligence Platform and …
Easy Solutions launches digital threat protection suite
Today at RSA Conference 2017 in San Francisco, Easy Solutions unveiled its Digital Threat Protection suite. The offering enables organizations with a proactive strategy …
Qualys brings web application security automation to a new level
At RSA Conference 2017, Qualys announced new functionality in its web application security offerings, including scalable fast scanning, detection and patching of websites, …
Tips on how to address the growing cyber security skills gap
Sophisticated cyber security defenses are increasingly in high demand as a cyber security attack is now viewed as an inevitability. However, a majority of surveyed …
IBM Watson to power cognitive security operations centers
At RSA Conference 2017, IBM Security announced Watson for Cyber Security, the industry’s first augmented intelligence technology designed to power cognitive security …
40% of cloud services are commissioned without the involvement of IT
Intel Security released its second annual cloud security report, “Building Trust in a Cloudy Sky,” at RSA Conference 2017. The report outlines the current state of cloud …
RansomFree protection software gets key upgrades
Today, at RSA Conference 2017 in San Francisco, Cybereason launched the latest version of RansomFree, the free, anti-ransomware protection software, which works on PCs running …
Security skills gap? What security skills gap?
After the year we’ve had, it shouldn’t come as a surprise that cybersecurity skills are heavily in demand. Breaches, attacks and incidents have never been far from the …
Five ways to prevent data leaks
The story still strikes fear into the hearts of IT departments: As many as 70 million credit- and debit card accounts were compromised in less than a month during the Target …
Six critical customer support differentiators in cybersecurity
Regardless of size or sector, excellent customer support is a major differentiator within any organization. In the cybersecurity industry, however, tech support is more than a …
Featured news
Resources
Don't miss
- Rhadamanthys infostealer operation disrupted by law enforcement
- Healthcare security is broken because its systems can’t talk to each other
- Wanna bet? Scammers are playing the odds better than you are
- Google adds Emerging Threats Center to speed detection and response
- UK’s new Cyber Security and Resilience Bill targets weak links in critical services