Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
fake news
People spend a little less time looking at fake news headlines than factual ones

The term fake news has been a part of our vocabulary since the 2016 US presidential election. As the amount of fake news in circulation grows larger and larger, particularly …

Toshiba S300 Surveillance Hard Disk Drive series now optimized for demanding surveillance applications

Toshiba announces the expansion of the Toshiba S300 Surveillance Hard Disk Drive series. This includes a new S300 series using shingled magnetic recording (SMR) technology for …

Paul Appleby joins Elastic as president, worldwide field operations

Elastic announced the appointment of Paul Appleby as president, worldwide field operations. Appleby was most recently the chief executive officer of Kinetica, and will be …

password management
How do I select a password management solution for my business?

91 percent of people know that using the same password on multiple accounts is a security risk, yet 66 percent continue to use the same password anyway. IT security …

identity
Facing gender bias in facial recognition technology

In the 1960s, Woodrow W. Bledsoe created a secret program that manually identified points on a person’s face and compared the distances between these coordinates with other …

tracking
Confirmed: Browsing histories can be used to track users

Browsing histories can be used to compile unique browsing profiles, which can be used to track users, Mozilla researchers have confirmed. There are also many third parties …

question
91% of cybersecurity pros want stricter internet measures to tackle misinformation

There’s a growing unease amongst the cybersecurity community around the recent rise in misinformation and fake domains, Neustar reveals. 48% of cybersecurity …

healthcare
Researchers develop AI technique to protect medical devices from anomalous instructions

Researchers at Ben-Gurion University of the Negev have developed a new AI technique that will protect medical devices from malicious operating instructions in a cyberattack as …

cybersecurity
A look at enterprise network and application modernization efforts

80% of organizations are struggling to reach application delivery requirements with their existing infrastructure. But, amid pandemic concerns, efforts to modernize networks …

Dataguise unveils method for enterprises to report impact of data breach faster and more accurately

Dataguise announced a patent-pending method of projecting unique data counts that enables organizations to report the impact of a data breach faster and more accurately than …

CBTS launches Secure Remote Collaboration solution portfolio optimized for WFH environments

CBTS announces the launch of its Secure Remote Collaboration portfolio of solutions, including video conferencing and security functionality that is optimized for …

CTM360 Threat Manager: Allowing users to tackle threats on the go

CTM360 has announced the launch of its latest mobile app, ‘The Threat Manager.’ The app aims to allow it’s users to tackle threats on the go, with the aim to simplify security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools