Features
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104710/chess-1-400x200.jpg)
Deception security doesn’t have to be onerous or expensive
When talking about deception security, most infosec pros’ mind turns to honeypots and decoy systems – additional solutions that companies have to buy, deploy, and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105349/abstract-1-400x200.jpg)
Machine learning in information security: Getting started
Machine learning (ML) technologies and solutions are expected to become a prominent feature of the information security landscape, as both attackers and defenders turn to …
![woman](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105018/woman-400x200.jpg)
Women in infosec: Real-life experiences and challenges
In all segments of society and business, minorities encounter problems that the majority rarely or never faces. And information security is – I think we can all agree …
![kaspersky Lab KIPS](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105554/kasperskylab-kips-400x200.jpg)
Cybersecurity gamification: A shortcut to learning
Cybersecurity awareness trainings are usually a boring affair, so imagine my colleagues’ surprise when I exited the room in which I participated in a demonstration of …
![Deepquest](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105656/deepquest-400x200.jpg)
Next level red teaming: Working behind enemy lines
The term “hacker” calls forth both positive and negative mental pictures, but I can bet that there are not many people, even in the infosec community, to whom the …
![checklist](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105851/checklist-400x200.jpg)
A checklist for people who understand cyber security
By now, it’s pretty much an accepted reality that it’s only a matter of time until an organization – any organization – gets breached by cyber …
![terminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110227/terminal2-400x200.jpg)
Quickly audit and adjust SSH server configurations with SSH-audit
SSH-audit is a standalone open source tool for auditing and fixing SSH server configurations. It has no dependencies and will run wherever Python is available. It supports …
![Dawnscanner](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110259/dawnscanner-400x200.jpg)
Scan Ruby-based apps for security issues with Dawnscanner
Dawnscanner is an open source static analysis scanner designed to review the security of web applications written in Ruby. Dawnscanner’s genesis Its developer, Paolo …
![IoT world](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110329/iot-globe-400x200.jpg)
Reposify: An IoT search engine that you can integrate into your products
With the unstoppable rise of the Internet of Things, and the still inevitable reality of their fundamental insecurity, knowing where, what and how secure they are is crucial …
![city](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110636/city-400x200.jpg)
Improve SecOps by making collaboration easier
There’s one word that we’ve consistently been hearing from information security pundits year after year: Collaboration. More often than not, they were talking …
![research](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110743/research-400x200.jpg)
How a security researcher is tackling IoT security testing
“A common misconception people in the industry have regarding my work as a security researcher is that I am sharing information that puts businesses at risk. And also, …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110801/businessman-400x200.jpg)
What differentiates a great CIO from simply a good one?
Earlier this month, Sophos announced the appointment of Tony Young as the company’s new global Chief Information Officer (CIO). Young started his career as a software …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD