Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
AttackIQ promotes Stacey Meyer to vice president of federal operations

AttackIQ, the leading independent vendor of breach and attack simulation solutions, announced the promotion of Stacey Meyer to vice president of federal operations. “Stacey …

James W. Sample joins Xcel Energy as vice president, Chief Security Officer

Xcel Energy announced that James W. Sample will join the company as Vice President, Chief Security Officer. Sample will lead the company’s security risk management program, …

Software AG appoints Dr. Matthias Heiden as its new Chief Financial Officer

Software AG announced the appointment of Dr. Matthias Heiden as its new Chief Financial Officer (CFO). Dr. Heiden will be taking over from Arnd Zinnhardt, who will step down …

iPipeline names Daphne Thomas as Chief Operating Officer

iPipeline – a leading provider of cloud-based software solutions for the life insurance and financial services industry – announced the appointment of Daphne Thomas to the …

Google Smart Lock
High-risk Google account owners can now use their iPhone as a security key

Google users who opt for the Advanced Protection Program (APP) to secure their accounts are now able to use their iPhone as a security key. About Google’s Advanced Protection …

Kubernetes
Kubernetes bug bounty program open to anyone, rewards up to $10,000

The Cloud Native Computing Foundation is inviting bug hunters to search for and report vulnerabilities affecting Kubernetes. Offered bug bounties range between $100 to …

bomb
Companies increasingly reporting attacks attributed to foreign governments

More than one in four security managers attribute attacks against their organization to cyberwarfare or nation-state activity, according to Radware. Nation-state intrusions …

shark
Cyber attackers turn to business disruption as primary attack objective

Over the course of 2019, 36% of the incidents that CrowdStrike investigated were most often caused by ransomware, destructive malware or denial of service attacks, revealing …

money
Budgetary, policy, workforce issues influencing DOD and intelligence community IT priorities

Information Technology spending by Department of Defense (DOD) and Intelligence Community (IC) agencies will continue to grow as they work to keep pace with the evolution of …

Masergy Shadow IT Discovery
Masergy Shadow IT Discovery: Automatically identify unauthorized SaaS applications

Masergy launched its Masergy Shadow IT Discovery solution. Shadow IT Discovery exposes enterprises to significant cybersecurity risks. Building on its mission to make security …

Cynerio
Cynerio offers hospitals free Windows 7 risk assessment

To prepare for the transition into Windows 7 End of Life, Cynerio is offering hospitals a complementary risk assessment until February 14, 2020. Connected medical devices are …

STEALTHbits StealthINTERCEPT
STEALTHbits StealthINTERCEPT 7.0 strengthens enterprise passwords and AD security

STEALTHbits released StealthINTERCEPT 7.0, their real-time Active Directory (AD) policy enforcement solution that audits and blocks unwanted and unauthorized changes, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools