Help Net Security
Four IT trends CIOs need to know about
CIOs looking for a benchmark to gauge IT success can depend on user experience metrics to provide the answer. In each of today’s “third platform” …
Healthcare cybersecurity market flooded with solutions
Hospitals face heightened concerns due to ubiquitous cyber-attacks that threaten the privacy and security of their data assets and enterprise IT systems. Theft of protected …
It’s time to replace firewalls in industrial network environments
Waterfall Security Solutions announced the expansion of its stronger-than-firewall solution portfolio for industrial control systems and critical infrastructure sites. …
Week in review: Black Hat USA 2016 coverage, QRLJacking, exposed SAP systems
Here’s an overview of some of last week’s most interesting news and articles: Black Hat USA 2016 Want to learn the news from Black Hat USA 2016? Get is all from …
Photo gallery: Black Hat USA 2016 Business Hall, part 2
A few more photos from the Black Hat USA 2016 Business Hall. Featured companies: NSFOCUS, Qualys, FireEye, Synack, Forcepoint, LogRhythm. Also featured is the US Department of …
New home router OS tackles firmware shortcomings
Untangle announced the release of a new operating system for consumer Wi-Fi routers at DEF CON 24. Router hardware has evolved and improved over the years, but its firmware …
75% of the top 20 US banks are infected with malware
SecurityScorecard released its 2016 Financial Cybersecurity Report, a comprehensive analysis that exposes cybersecurity vulnerabilities across 7,111 global financial …
Can a computer system compete against human CTF experts?
DARPA announced on Thursday that a computer system designed by a team of Pittsburgh-based researchers is the presumptive winner of the Agency’s Cyber Grand Challenge. The …
How to avoid vendor lock-in and get more flexibility
Traditionally, customers, and security teams have worked with a single major technology provider, like IBM or Symantec, to build out their entire security stack. Layers that …
58% of orgs have no controls in place to prevent insider threats
More than half of organizations (58 percent) still lack the appropriate controls to prevent insider attacks, with just under half (44 percent) unaware if their organization …
Kazakhstan govt targeted journalists, political activists with spyware
Journalists and political activists critical of Kazakhstan’s authoritarian government, along with their family members, lawyers, and associates, have been targets of an online …
Dagah: Penetration testing for enterprise mobility programs
Shevirah Inc. will unveil at Black Hat USA 2016 the free version of dagah – a product that empowers security test teams to assess the security posture of their mobility …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does