Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Secure hardware storage encryption from SafeNet

SafeNet extends its comprehensive portfolio of data security solutions into the storage security market with StorageSecure, a NAS security solution developed in partnership …

From identity and access solutions to access governance

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of …

Military-grade encryption for Android devices

AuthenTec introduced a new security offering that provides military-grade encryption to data stored on Android smartphones and tablets. MatrixDAR helps bring Android devices …

OkayFreedom: VPN solution for private surfing

Steganos Software announced OkayFreedom, a VPN service enabling Internet users to privately and securely surf all Web content, regardless of their location. Designed for …

Developing and Hosting Applications on the Cloud

In this book, key developers of the IBM SmartCloud Enterprise share indispensable insights for developing and operating cloud-based solutions on any cloud platform. Drawing on …

Week in review: Shamoon attacks, automated hacking, Assange granted asylum in Ecuador

Here’s an overview of some of last week’s most interesting news, podcasts, reviews, videos and articles: Scientists create algorithm for tracking down sources of …

Provisioning is not access governance

Organizations of all sizes face ever-stricter regulatory and security requirements to protect their data, and that of their customers. But user provisioning systems alone …

Fluke Networks adds remote analyzer capability to wireless LAN tools

Fluke Networks announced a new remote analysis capability for its portable WLAN tools, making them the first to enable both real-time troubleshooting and spectrum analysis of …

Programming Computer Vision with Python

If you want a basic understanding of computer vision’s underlying theory and algorithms, this hands-on introduction is the ideal place to start. You’ll learn …

Tips to keep kids safe online

Malware is just a step-away when children click on games, free shoes, Justin Bieber videos or gift cards offered on social networks. Hackers use social engineering techniques …

Sharp rise in malware targeting Android

The number of new malicious programs targeting the Android platform has almost tripled in the second quarter of the year, according to Kaspersky Lab. Over the three months in …

Top mobility challenges facing C-level executives

Mre than fifty percent of the companies surveyed are now planning Mobile Productivity projects to allow employees to access, sync and share documents using mobile devices, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools