![Cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194157/computer-cloud-400x200.jpg)
8 in 10 IT pros believe believe their data is safer in the cloud
Eight in 10 IT professionals and executives believe that when facing hardware malfunctions and environmental disasters, their organization’s data is safer in the cloud …
![OptioLabs OptioInsight](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194202/optio-insight-400x200.jpg)
Correlate real-time data from mobile devices across the enterprise
OptioLabs announced the availability of OptioInsight for enterprises using OptioCore-secured devices. OptioInsight correlates real-time data from mobile devices across the …
![Niara dashboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194204/niara-dashboard-display-400x200.png)
Utilize any data source to see attacks on the inside
Niara, a provider of security analytics for attack detection and incident response, announced that the latest release of its security analytics platform analyzes any data …
![Siemplify](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194207/siemplify-400x200.jpg)
Siemplify brings military intelligence capabilities to enterprise security operations
Transforming the way enterprises perform cyberthreat analysis, Siemplify emerged from stealth mode with the first security operations platform to employ the same cybersecurity …
![VERA](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194210/vera-400x200.jpg)
Vera secures $17 million in series B financing
Vera, a top 10 finalist for the Innovation Sandbox competition at RSA Conference 2016, has closed $17 million in Series B financing, led by Sutter Hill Ventures, with …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194215/healthcare-400x200.jpg)
Hacking hospitals: Cyber attacks can result in physical harm
Independent Security Evaluators (ISE) published a study that demonstrates security flaws to be pervasive within the healthcare industry. The research found that adversaries …
![ASUS](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194212/asus-400x200.jpg)
FTC forces Asus to improve router security
The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s …
![NSA](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194610/nsa-400x200.jpg)
NSA spied on world leaders, UN, EU officials
A set of highly classified documents recently published by WikiLeaks show how the NSA spied on a number of high ranking officials of the UN, UNHCR, WTO, NATO, the EU and …
![MouseJack](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194223/mousejack-400x200.jpg)
MouseJack: Remote exploitation via radio frequencies
Bastille has uncovered a massive vulnerability in wireless mice and keyboards that leaves billions of PC’s and millions of networks vulnerable to remote exploitation via radio …
![Japan](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194226/japan_flag-400x200.jpg)
Japanese critical infrastructure under targeted attack
Cylance revealed a multi-year, multi-attack campaign against the Japanese critical infrastructure. Their research uncovers how a well-organized and well-funded threat group, …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194229/connections-400x200.jpg)
Working towards a common set of IoT standards
Major industry leaders who are invested in the future of the Internet of Things, announced they will unify as the Open Connectivity Foundation (OCF), an entity whose goal will …
![illusive networks](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194233/illusive-view-400x200.jpg)
Attacker View exposes hidden cyber attack paths
Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark