Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
email
SAFE Phish: Phish testing and training redefined

Mimecast announced an industry changing capability that will allow customers to launch live phishing simulations. Known as SAFE Phish, it’s designed to let security teams …

Verimatrix unveils anti-tamper tech to protect Bitcode-enabled iOS apps

Verimatrix announced new protection for Bitcode-enabled iOS applications. Publishing an app to Apple’s App Store with Bitcode enabled allows Apple to optimize the app’s code …

Intel and VMware extend virtualization to RAN through broadened collaboration for 5G

Intel and VMware are collaborating on an integrated software platform for virtualized Radio Access Networks (RAN) to accelerate the rollout of both existing LTE and future 5G …

Microchip releases Flashtec NVMe 3108 PCIe Gen 4 enterprise NVMe SSD controller

As data centers support more Artificial Intelligence (AI) and Machine Learning (ML) workloads, there is a need for cloud scale infrastructure that provides more bandwidth to …

Patrick Harr becomes CEO of SlashNext

SlashNext announced that security and cloud services veteran Patrick Harr has joined the company as CEO. With a proven track record of leading security and cloud startups, as …

Firefox
Firefox to block redirect tracking

Mozilla has announced a new Firefox protection feature to stymie a new user tracking technique lately employed by online advertisers: redirect tracking. How does redirect …

BluBracket updates Code Security Suite, adds stolen and leaked code detection

BluBracket introduced significant new functionality to its Code Security Suite, allowing companies for the first time to find stolen and copied source code in public …

encryption
Engaging business units in security governance: Why everyone should be concerned

The idea that security is everyone’s business is a familiar refrain. But as enterprises look to combine the speed of software delivery with both cybersecurity and business …

Code
Security analysis of legacy programming environments reveals critical flaws

New research from Trend Micro highlights design flaws in legacy languages and released new secure coding guidelines. These are designed to help Industry 4.0 developers greatly …

identity
As personal use of managed devices becomes ubiquitous, risks increase

Netskope analyzed the most interesting trends on enterprise cloud service and app use, web and cloud-enabled threats, and cloud data migrations and transfers. Based on …

account
Many companies have not taken basic steps to protect their remote workforce

New research shows almost three quarters of large businesses believe remote working policies introduced to help stop the spread of COVID-19 are making their companies more …

brain
Ways AI could be used to facilitate crime over the next 15 years

Fake audio or video content has been ranked by experts as the most worrying use of artificial intelligence in terms of its potential applications for crime or terrorism, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools