Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Boothole
Bug in widely used bootloader opens Windows, Linux devices to persistent compromise

A vulnerability (CVE-2020-10713) in the widely used GRUB2 bootloader opens most Linux and Windows systems in use today to persistent compromise, Eclypsium researchers have …

money
The average total cost of a data breach declined, but costs increased for many organizations

Data breaches cost companies $3.86 million per breach on average, and compromised employee accounts are the most expensive root cause. Based on in-depth analysis of data …

lock
Delivering and maintaining security at the speed of digital transformation

Dustin Rigg Hillard, CTO at eSentire, is responsible for leading product development and technology innovation. His vision is rooted in simplifying and accelerating the …

SSD
Things to consider when selecting enterprise SSDs for critical workloads

The process of evaluating solid state drives (SSDs) for enterprise applications can present a number of challenges. You want maximum performance for the most demanding servers …

identity theft
Most consumers believe government regulation should help address privacy risks

As consumers’ concerns about their digital privacy continue to grow and who is responsible for guarding it remains unclear, new research conducted by Ponemon Institute …

fix
Businesses are preparing for a cloud-based approach to applications

While most enterprises are committed to modernizing their application software portfolios, there are still myriad challenges to overcome and improvements to be made, according …

CloudEOS: Production multi-cloud at high scale

Arista Networks announced several additions to its multi-cloud and cloud-native software product family with CloudEOS Edge: designed to integrate with native cloud networking …

Quarterly KACE Cloud MDM release includes Windows 10 enrollment

Quest Software announced its continued evolution and advancement for Quest KACE Unified Endpoint Management (UEM). As part of UEM, KACE provides organizations the power to …

Offensive Security
Offensive Security acquires security training project VulnHub

Offensive Security has acquired open source security training resource hub VulnHub. The acquisition is part of OffSec’s ongoing mission to provide practical training content …

ISC2 report
(ISC)² signs up Global Knowledge as official training provider

(ISC)² announced that Global Knowledge has been added as an Official Training Provider for the UK, further expanding the range of leading training organizations offering …

Qualys
Qualys acquires software assets of Spell Security

Qualys has acquired the software assets of Spell Security, an endpoint detection and response start-up. This acquisition further strengthens Qualys’ security and threat …

Qualys
Qualys unveils Multi-Vector EDR, a new approach to endpoint detection and response

Qualys today announced Qualys Multi-Vector EDR. Taking a new multi-vector approach to Endpoint Detection and Response (EDR), Qualys now brings the unifying power of its highly …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools