Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
BrickStor Security Platform facilitates data security for distributed workforces and hybrid clouds

RackTop Systems announced the general availability of key features in the BrickStor Security Platform (SP) to facilitate data security and protection for distributed …

Lacework platform now features Active Host Vulnerability Monitoring and CI/CD integrations

Lacework announced that in the midst of a period of rapid adoption by developers of born-in-the-cloud applications, it will introduce Active Host Vulnerability Monitoring, …

VMware brings Kubernetes to its VMware Fusion and VMware Workstation solutions

VMware unveiled the newest versions of its VMware Fusion and VMware Workstation desktop hypervisor solutions. VMware’s updates support the changing needs of modern developers …

Zoom for Home expands to smart displays, integrates with Facebook, Amazon and Google

Zoom announced that Zoom for Home is expanding to smart displays including Amazon Echo Show, Portal from Facebook, and Google Nest Hub Max, bringing Zoom to widely-used …

Western Digital introduces WD brand My Passport SSD in capacities up to 2TB

For consumers who need to accelerate their productivity and protect their valuable content without compromising style, Western Digital introduced the new WD brand My Passport …

Ooma Wi-Fi: Taking the complexity out of wireless networking for small and medium-sized businesses

Ooma announced Ooma Wi-Fi, a service for Ooma Office cloud-based phone service customers that takes the complexity out of wireless networking for small and medium-sized …

Elasticsearch
Elastic Security 7.9 delivers a major milestone toward endpoint security integrated into the Elastic Stack

Elastic announced the first major beta milestone for Elastic in delivering comprehensive endpoint security fully integrated into the Elastic Stack, centrally managed under a …

IoT
What enterprises should consider when it comes to IoT security

Many enterprises have realized that the IoT presents tremendous business opportunities. The IoT can help businesses stay agile in changing situations and maintain a high level …

UCI research
Disrupting a power grid with cheap equipment hidden in a coffee cup

Cyber-physical systems security researchers at the University of California, Irvine can disrupt the functioning of a power grid using about $50 worth of equipment tucked …

brain
62% of blue teams have difficulty stopping red teams during adversary simulation exercises

New Exabeam research shows that 62 percent of blue teams have difficulty stopping red teams during adversary simulation exercises. Respondents named threat detection, incident …

ICS
Most ICS vulnerabilities disclosed this year can be exploited remotely

More than 70% of ICS vulnerabilities disclosed in the first half of 2020 can be exploited remotely, highlighting the importance of protecting internet-facing ICS devices and …

ISO
Thousands of ISO certifications at risk of lapsing due to halted re-certification audits

Thousands of valuable ISO management system certifications earned by UK companies may now be at risk because auditors from Certification Bodies may not have been able to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools