Arcserve and Sophos provide orgs with protection for backed up data against cyberthreats
Arcserve, the world’s most experienced data protection provider, announced a global alliance with Sophos, a leader in network and endpoint security, to provide organizations …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
Sandboxie becomes freeware, soon-to-be open source
Sophos plans to open source Sandboxie, a relatively popular Windows utility that allows users to run applications in a sandbox. Until that happens, they’ve made the …
![breach prevention systems](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093646/breach_prevention_systems-400x200.jpg)
Which are the most capable breach prevention systems?
NSS Labs released its Analysis of Breach Prevention Systems (BPS) – solution suites, involving endpoint, network, sandbox, cloud, and other integrated protections. …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102855/stop-400x200.jpg)
Thwart the pressing threat of RDP password attacks
How long does it takes for Internet-facing, RDP-enabled computers to come under attack? In some cases, a few minutes. In most, less than 24 hours. The problem with RDP …
![NGFW](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093913/ngfw2-400x200.jpg)
NSS Labs test exposes weaknesses in NGFW products
Firewalls are the most widely deployed network security devices. Enterprises expect next generation firewalls (NGFWs) to prevent exploits and malware from infecting critical …
![complex](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093943/complex-400x200.jpg)
Multi-stage attack techniques are making network defense difficult
IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology, …
Sophos acquires Rook Security
Sophos, a global leader in network and endpoint security, has acquired Rook Security, a pioneer and leader in managed detection and response (MDR) services. Rook Security …
![Microsoft impersonate](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100534/microsoft-impersonate-400x200.jpg)
Microsoft updates break AV software, again!
Microsoft’s May 2019 security fixes have again disrupted the normal functioning of some endpoint security products on certain Windows versions. Current problems …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101722/laptop-400x200.jpg)
IT managers can’t ignore endpoints because most cyberattacks start there
IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to the 7 Uncomfortable Truths of Endpoint …
![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102056/google_play-400x200.jpg)
Stealthy cryptomining apps still on Google Play
Researchers have flagged 25 apps on Google Play that are surreptitiously mining cryptocurrency for their developers, and some of these have still not been removed, they warn. …
![Skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103817/skull-ascii-400x200.jpg)
How the SamSam attacker stole millions from US companies
There are many reasons that the SamSam ransomware has achieved widespread notoriety: it disrupted the operations of some of its victims to a point that the attack …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100903/infosec-eu-2018-400x200.jpg)
Photo gallery: Infosecurity Europe 2018 Expo, part 2
Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Bomgar, Qualys, Fidelis Cybersecurity, Cisco, Nuvias Group.
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege