Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Ideas
Four IT trends CIOs need to know about

CIOs looking for a benchmark to gauge IT success can depend on user experience metrics to provide the answer. In each of today’s “third platform” …

Doctor
Healthcare cybersecurity market flooded with solutions

Hospitals face heightened concerns due to ubiquitous cyber-attacks that threaten the privacy and security of their data assets and enterprise IT systems. Theft of protected …

Critical infrastructure
It’s time to replace firewalls in industrial network environments

Waterfall Security Solutions announced the expansion of its stronger-than-firewall solution portfolio for industrial control systems and critical infrastructure sites. …

general virtual digital
Week in review: Black Hat USA 2016 coverage, QRLJacking, exposed SAP systems

Here’s an overview of some of last week’s most interesting news and articles: Black Hat USA 2016 Want to learn the news from Black Hat USA 2016? Get is all from …

Photo gallery: Black Hat USA 2016 Business Hall, part 2

A few more photos from the Black Hat USA 2016 Business Hall. Featured companies: NSFOCUS, Qualys, FireEye, Synack, Forcepoint, LogRhythm. Also featured is the US Department of …

New home router OS tackles firmware shortcomings

Untangle announced the release of a new operating system for consumer Wi-Fi routers at DEF CON 24. Router hardware has evolved and improved over the years, but its firmware …

match burn
75% of the top 20 US banks are infected with malware

SecurityScorecard released its 2016 Financial Cybersecurity Report, a comprehensive analysis that exposes cybersecurity vulnerabilities across 7,111 global financial …

DARPA Cyber Grand Challenge
Can a computer system compete against human CTF experts?

DARPA announced on Thursday that a computer system designed by a team of Pittsburgh-based researchers is the presumptive winner of the Agency’s Cyber Grand Challenge. The …

How to avoid vendor lock-in and get more flexibility

Traditionally, customers, and security teams have worked with a single major technology provider, like IBM or Symantec, to build out their entire security stack. Layers that …

Eyes
58% of orgs have no controls in place to prevent insider threats

More than half of organizations (58 percent) still lack the appropriate controls to prevent insider attacks, with just under half (44 percent) unaware if their organization …

eye
Kazakhstan govt targeted journalists, political activists with spyware

Journalists and political activists critical of Kazakhstan’s authoritarian government, along with their family members, lawyers, and associates, have been targets of an online …

Dagah: Penetration testing for enterprise mobility programs

Shevirah Inc. will unveil at Black Hat USA 2016 the free version of dagah – a product that empowers security test teams to assess the security posture of their mobility …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools