Help Net Security

New certification program for forensic security responders
Guidance Software announced at RSA Conference 2016 Certified Forensic Security Responder (CFSR) training, a certification fills the skills gap with industry-accepted tools and …

Dell SecureWorks speeds up endpoint intrusion detection, response
Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak, a fully-managed SaaS solution that can slash the time required to detect and respond to …

Photo gallery: RSA Conference 2016 Expo – Moscone North
The RSA Conference 2016 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor of Moscone North. Featured companies: Qualys, RSA, …

Balabit’s Blindspotter extends behavior analysis with biometrics
Balabit, best known as “the creator of syslog-ng,” announced the release of Blindspotter version 2016.03 at the RSA Conference in San Francisco. The new version of its …

Barracuda showcases new firewall for IoT applications and deployments
At RSA Conference, Barracuda announced it has expanded its next-generation firewall product family with the addition of the new Barracuda NextGen Firewall S-Series, which is …

Qualys delivers scalable, cloud-based patching
Qualys announced at RSA Conference an OEM partnership with HEAT Software to deliver a cloud-based patch management offering to its global customers. The partnership allows …

Crypto pioneers Diffie and Hellman win Nobel Prize of Computing
ACM, the Association for Computing Machinery has announced at RSA Conference that it has awarded crypto pioneers Whitfield Diffie and Martin E. Hellman the 2015 ACM A.M. …

Open source risk management tool for Android application packages
Are there any security vulnerabilities in the open source you use? At RSA Conference, WhiteSource announced the release of the industry’s first Android Application Package …

Only one in five orgs set up to securely manage user identities
As organizations seek to capitalize on digital opportunities through rapidly developing and hosting new services online, they frequently under-invest in adequate cybersecurity …

Repeat DDoS and web application attacks become the norm
Akamai Technologies has shared the latest DDoS and web application attacks numbers in its Q4 2015 State of the Internet report. DDoS attack activity at a glance During Q4, …

Ten technologies to unlock the full potential of the Internet of Things
Gartner has highlighted the top 10 Internet of Things (IoT) technologies that should be on every organization’s radar through the next two years. “The IoT demands …

ThreatQuotient wins Security Start Up of the Year award
ThreatQuotient announced its Threat Intelligence Platform (TIP), ThreatQ, was recognized as a Silver winner for Innovation in Enterprise Security at the 2016 Info Security …
Featured news
Resources
Don't miss
- Report: The State of Secrets Sprawl 2025
- APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373)
- Moving beyond checkbox security for true resilience
- Dependency-Check: Open-source Software Composition Analysis (SCA) tool
- Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK