Please turn on your JavaScript for this page to function normally.
HITB Amsterdam
Cyber Battle of the Emirates: Training the next generation of cyber security pros

Held annually in Asia, Europe and the Middle East, Hack In The Box conferences bring together the world’s top cyber security experts to share and discuss their latest …

arrows
Week in review: Simjacker attacks, critical Exim flaw, Sandboxie becomes freeware

Here’s an overview of some of last week’s most interesting news, interviews and articles: More than a year after GDPR implementation, half of UK businesses are not …

tools
Sandboxie becomes freeware, soon-to-be open source

Sophos plans to open source Sandboxie, a relatively popular Windows utility that allows users to run applications in a sandbox. Until that happens, they’ve made the …

light
New infosec products of the week: September 13, 2019

Awake Security enhances its platform with the ability to identify attackers based on their intent Awake Security introduced Adversarial Modeling, an industry-first capability …

data
The rise of modern applications, DevSecOps and the intelligence economy

There has been a significant year-over-year growth in enterprise usage trends around multi-cloud adoption, open source technologies such as Kubernetes, and AWS cloud-native …

vectors
Security leaders lack confidence in the supply chain, fear third-party attacks

An overwhelming number of cybersecurity professionals (89%) have expressed concerns about the third-party managed service providers (MSPs) they partner with being hacked, …

connected
Interacting with governments in the digital age: What do citizens think?

Most U.S. citizens acknowledge and accept that state and local government agencies share their personal data, even when it comes to personal information such as criminal …

find
Cyber risk assessment of U.S. election commissions finds critical areas for improvement

Many election commissions are focused on quickly adapting and updating their cybersecurity; however, commissions still need to dedicate resources to updating outdated …

Simjacker
Simjacker vulnerability actively exploited to track, spy on mobile phone owners

Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being …

data
How to navigate critical data security and privacy policy challenges

By 2020, there will be 40x more bytes of data than there are stars in the universe as we know it. And with data growth comes more security and privacy obstacles for …

IIoT
IIoT security challenges: Dealing with cutting edge technologies

Dr. Jesus Molina is the Director of Business Development at Waterfall Security Solutions, and in this interview with Help Net Security he talks about the security issues …

GDPR
More than a year after GDPR implementation, half of UK businesses are not fully compliant

52% of UK businesses are not fully compliant with the regulation, more than a year after its implementation, according to a survey of UK GDPR decision-makers conducted on …

Don't miss

Cybersecurity news