Help Net Security

My reflections after visiting RSA Conference 2016
RSA Conference has long been the place where security vendors announce new products and services, and industry trends are made. I was told by Centrify that recent breaches …

BorgBackup: Deduplication with compression and authenticated encryption
BorgBackup is a deduplicating backup program that supports compression and authenticated encryption. The main goal of BorgBackup is to provide an efficient and secure way to …

Week in review: DROWN attack breaks TLS encryption, hijacking police drones, RSA Conference 2016 coverage
Here’s an overview of some of last week’s most interesting news, reviews and articles: RSA Conference 2016 coverage Check out our coverage page to see what …

Photo gallery: RSA Conference 2016 Expo
RSA Conference 2016 ends today, and as a wrap up, here are a few more photos from the Expo floor. Featured companies: Niara, SecureAuth, Qualys, Tenable, Auconet, FireEye, Algosec.

How effective are orgs at detecting and investigating cyber threats?
A new threat detection effectiveness survey compiling responses from more than 160 respondents around the world has provided valuable global insight into what technologies …

WinMagic provides encryption of virtual machines running on IaaS platforms
At RSA Conference 2016 WinMagic introduced security software that encrypts virtual machines running on Infrastructure as a Service (IaaS) platforms. Addressing the growing …

Real-time detection and automatic containment of Active Directory attacks
CyberArk announced at RSA Conference new real-time threat detection and containment capabilities to help organizations secure against cyber attacks targeting Microsoft Active …

Bank password policies are often substandard, study finds
A study of 17 major US banks shows that six of them have weak password handling and that their password procedures are weaker than most social websites. The six banks, 35 …

Cybersecurity still seen as a tech issue, not a business imperative
Cybersecurity is now front and center on organizations’ boardroom agendas, but most chief information security officers (CISOs) have yet to earn a seat at the table. According …

NetRandom generates, delivers true random numbers for crypto operations
At RSA Conference, Whitewood Encryption Systems has launched netRandom, a suite of products that transforms the way high-quality true random numbers are accessed across the …

Most infosec pros consider government-mandated encryption backdoors a bad idea
Apple and the FBI have been engaged in a legal battle over the federal government’s right to require built-in smartphone encryption software that could aid law enforcement …

Cyber operations platform to automate the hunt for cyber adversaries
At RSA Conference Endgame announced the launch of a comprehensive cyber operations platform for organizations to detect, block, and evict advanced threats at the earliest …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems