Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
DJI drone
Researchers discover how to pinpoint the location of a malicious drone operator

Researchers at Ben-Gurion University of the Negev (BGU) have determined how to pinpoint the location of a drone operator who may be operating maliciously or harmfully near …

backup
Global data center networking market to reach $40.9 billion by 2025

The global data center networking market is projected to reach $40.9 billion by 2025 and projected to register 11.0% CAGR over the forecast period, from 2019 to 2025 according …

Cyral ships zero trust data layer GA security platform

Cyral, provider of the first cloud security platform for the data layer, announced general availability of its data layer security platform. “Cyral pioneered the concept of a …

Ericsson’s new software enables 5G NR to operate independently of 4G networks

Communications service providers can now tap the full potential of 5G New Radio (NR) technology with the commercial availability of Ericsson Standalone 5G NR software for 5G …

NewDay selects RSA Adaptive Authentication for eCommerce to protect digital payments from fraud

RSA announces that NewDay has selected and deployed RSA Adaptive Authentication for eCommerce to deliver advanced fraud protection for digital payments and address the …

V-Key’s V-OS receives Common Criteria EAL rating of 3+

V-Key announced that V-OS, V-Key’s core patented technology, is the world’s first virtual secure element to receive a Common Criteria Evaluation Assurance Level (EAL) rating …

F5
Attackers are breaching F5 BIG-IP devices, check whether you’ve been hit

Attackers are actively trying to exploit CVE-2020-5902, a critical vulnerability affecting F5 Networks‘ BIG-IP multi-purpose networking devices, to install coin-miners, …

architecture
Data exfiltration: The art of distancing

We have all seen the carefully prepared statement. A cyber incident has occurred, we are investigating but please do not worry since no data has left our network. Perhaps we …

application
Cybersecurity software sales and training in a no-touch world

The pandemic has led to an outbreak of cybercriminal activity focused on remote workers and enterprises that needed to quickly migrate to the cloud to maintain business …

Cybersecurity Threats, Malware Trends, and Strategies
Review: Cybersecurity Threats, Malware Trends, and Strategies

Tim Rains, who formerly held many essential roles at Microsoft and is currently working at Amazon Web Services as Regional Leader for Security and Compliance Business …

connection
Managers and employees support digital transformation, but see room for improvement

Digital transformation has widespread support among managers and employees, but some think that the pace of change at their companies could be faster, they could be more …

Zettaset’s encryption solutions now available on VMware Cloud Marketplace

Zettaset announced the availability of its encryption solutions on VMware Cloud Marketplace. Zettaset XCrypt Kubernetes & Container Encryption and XCrypt Virtual Key …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools