Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Push Technology releases Diffusion Kafka Adapter

Push Technology launched a new Kafka Adapter for their Diffusion Intelligent Data Mesh. With the Diffusion Kafka Adapter, organizations can now securely extend Kafka solutions …

SimIQ: Efficient GNSS testing during product development

Spirent Communications released SimIQ. From software-in-the-loop through to final form testing, SimIQ enables developers to collaborate across the full design lifecycle …

HPE and SAP partner to deliver SAP HANA Enterprise Cloud with HPE GreenLake

HPE announced plans to partner with SAP to deliver the customer edition of SAP HANA Enterprise Cloud with HPE GreenLake, as a fully managed service at the edge, in the …

Balbix BreachControl added to Ingram Micro Cloud Marketplace

Balbix announced a global cloud distribution agreement with Ingram Micro that brings its award-winning Balbix BreachControl solution to the Ingram Micro Cloud Marketplace, a …

USA flag
State Department offers $10 million for info on hackers targeting U.S. elections

As the day of the U.S. presidential elections is quickly approaching, election security is again becoming a topic of more and more security discussions. Are the polling booth …

TeamViewer
TeamViewer flaw could be exploited to crack users’ password

A high-risk vulnerability (CVE-2020-13699) in TeamViewer for Windows could be exploited by remote attackers to crack users’ password and, consequently, lead to further …

money
How can security leaders maximize security budgets during a time of budget cuts?

It’s no secret that the current pandemic is causing a major strain on consumers and businesses alike. As the U.S. teeters on the verge of a recession, companies are cutting …

cloud
Misconfigured cloud storage services are commonplace in 93% of deployments

Cloud breaches will likely increase in velocity and scale, and highlights steps that can be taken to mitigate them, according to Accurics. “While the adoption of cloud native …

password
25% of IT workers don’t enforce security policies

14% of IT workers are consumed with Identity and Access Management (IAM), spending at least an hour per day on routine IAM tasks, according to 1Password. IAM continues to be a …

biohazard
Malware attacks abusing machine identities grew 8x over the last 10 years

Commodity malware campaigns utilizing machine identities are increasing rapidly, according to threat analysis from Venafi. For example, malware attacks using machine …

attacks
Cybercriminals are developing and boosting their attacks

An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift from individuals and small businesses to major corporations, governments …

CISSP
Discounted CISSP exam prep pricing is back

This promotion has ended. Challenging times call for exceptional measures, and (ISC)² is committed to helping you keep your CISSP certification goals on track this year. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools