Help Net Security

Photo gallery: RSA Conference 2016 Innovation Sandbox
The RSA Conference 2016 is underway at the Moscone Center in San Francisco. Here are a few photos from the Innovation Sandbox, where the 10 finalists – Bastille …

Companies are realizing that security and privacy go hand in hand
50 percent of companies over the past two years have increased the involvement of privacy professionals on their information security teams to enhance the prevention of data …

BluVector 2.0: Machine-learning malware detection
At RSA Conference 2016 Acuity Solutions announced the release of version 2.0 of BluVector, its machine-learning malware detection and cyber hunting solution, which now …

Phantom named RSA Conference 2016’s Most Innovative Startup
RSA Conference has named Phantom “RSAC Most Innovative Startup 2016″ in its Innovation Sandbox Contest. A panel of venture capitalists, entrepreneurs and large security …

Terbium Labs closes $6.4m in funding for stolen data discovery on Dark Web
Terbium Labs announced at RSA Conference that it has raised $6.4 million in Series A financing led by .406 Ventures, bringing the total raised to $9.7 million. Terbium Labs …

Qualys extends Cloud Agent Platform to support Linux and Mac OS
Qualys announced the expansion of the Qualys Cloud Agent Platform. The Cloud Agent platform empowers organizations with flexibility and real-time asset inventory searches on a …

Critical gaps in IT departments’ approach to enterprise security
A new study by conducted by Ultimate Windows Security, released at RSA Conference, provides visibility into the uses, concerns and challenges that IT departments face in …

Discover, classify, protect and analyze data with TITUS Illuminate
According to a recent Forrester report, data discovery and classification is an often-overlooked yet critical component of data security and control. Today, at RSA Conference …

Top 12 cloud computing threats in 2016
The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an …

The everyday application interactions putting enterprises at risk
With greater awareness about the risks of unsecured privileged accounts allowing broad, anonymous access across the enterprise, privileged account security has become an …

Security audit identified risky e-filing tax services
The Online Trust Alliance (OTA) evaluated the privacy, security and consumer protection practices of the thirteen IRS-approved free e-filing tax services. After an assessment …

Senior level perceptions about SAP security
More than half of companies believe it is likely their company would have a data breach due to insecure SAP applications, according to a new Ponemon Institute study. This same …
Featured news
Resources
Don't miss
- Report: The State of Secrets Sprawl 2025
- APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373)
- Moving beyond checkbox security for true resilience
- Dependency-Check: Open-source Software Composition Analysis (SCA) tool
- Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK