![](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195446/cisco-400x200.jpg)
Cisco removes weak default static credentials from its switches
Cisco has released on Wednesday a bucketload of software updates for a wide variety of its products, fixing vulnerabilities of different types and severity. But one is deemed …
![maritime ship cargo](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113814/maritime-400x200.jpg)
Sea pirates and cyber attacks: Information security breaches in the maritime industry
The Maritime Trade Information Sharing Center, Gulf of Guinea (MTISC-GoG) has denied that it has suffered a data breach that could result in sea pirates knowing details about …
![Doctor](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195051/doctor-health-400x200.jpg)
Cyber onslaught threatens to overwhelm healthcare
Healthcare organizations average about one cyber attack per month, say the result of the recent Ponemon study on the state of cybersecurity in healthcare organizations. Almost …
Cyberstalker sentenced to 10 years in prison
Michael Daniel Rubens, 31, formerly of Tallahassee, was sentenced today to 10 years in prison, a $15,000 fine, and $1,550 in restitution for cyberstalking, unauthorized access …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113827/stop-400x200.jpg)
Unmanaged wearables infiltrating the enterprise
Centrify has announced results from an onsite survey conducted at the RSA Conference 2016 regarding the prevalence of wearables in the enterprise and the growing concern they …
![cyber microscope](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114052/cyber_microscope-400x200.jpg)
New certification program for forensic security responders
Guidance Software announced at RSA Conference 2016 Certified Forensic Security Responder (CFSR) training, a certification fills the skills gap with industry-accepted tools and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113830/detect-400x200.jpg)
Dell SecureWorks speeds up endpoint intrusion detection, response
Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak, a fully-managed SaaS solution that can slash the time required to detect and respond to …
![rsac2016](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113835/gal3photo1-400x200.jpg)
Photo gallery: RSA Conference 2016 Expo – Moscone North
The RSA Conference 2016 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor of Moscone North. Featured companies: Qualys, RSA, …
![behavior analytics](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113838/wordcloud-400x200.jpg)
Balabit’s Blindspotter extends behavior analysis with biometrics
Balabit, best known as “the creator of syslog-ng,” announced the release of Blindspotter version 2016.03 at the RSA Conference in San Francisco. The new version of its …
![Firewall barracuda](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113839/Firewall-S-400x200.jpg)
Barracuda showcases new firewall for IoT applications and deployments
At RSA Conference, Barracuda announced it has expanded its next-generation firewall product family with the addition of the new Barracuda NextGen Firewall S-Series, which is …
![patching cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113841/patchingcloud-400x200.jpg)
Qualys delivers scalable, cloud-based patching
Qualys announced at RSA Conference an OEM partnership with HEAT Software to deliver a cloud-based patch management offering to its global customers. The partnership allows …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194155/keyboard-400x200.jpg)
Which passwords to avoid for Internet-facing systems?
For the last year or so, Rapid7 has been collecting login credentials via “Heisenberg,” a network of low-interaction honeypots that the company has set up to analyze login …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark