Help Net Security

Protecting enterprise data centers from threats that target Linux servers
Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more …

ServiceNow reinvents security response
ServiceNow is extending its automation and orchestration expertise to transform the way organizations respond to threats. Security Operations gives both security and IT teams …

CyberCalifornia initiative to facilitate research and innovation
More than ever, California stands at the forefront of new technologies based on the Internet of Things (IoT). We are also increasingly vulnerable, a fact underscored by …

Start getting ready for Europe’s new data protection regulation today
You are in charge of your organization’s security. Depending on how large and well resourced your business IT function is, your card might read IT director, CIO, CTO, or …

Is zero-effort computer security a dream?
Researchers from the University of Alabama at Birmingham and Aalto University have found vulnerabilities in a recently proposed user-verification security system for …

Can poorly designed embedded devices kill?
The industry is not taking safety and security seriously enough, according to the Barr Group, who conducted a survey to better understand the state of safety- and …

Cyber microscope enables advanced security anomaly detection
Lewis Rhodes Labs introduced the Cyber Microscope for faster and more accurate anomaly detection. The new product is based upon a Cyber Optimized Neuromorphic Processor that …

Phantom: Security automation and orchestration platform
The Phantom platform can integrate existing security technologies and provide a layer of “connective tissue” between otherwise disparate systems. Phantom was …

DB Networks partners with Cyphort and Security On-Demand
Big news from DB Networks, a provider of database cybersecurity products. They partnered with Cyphort to offer customers full spectrum visibility from the desktop and network …

Ping Identity enhances its Federated Access Management technology
Ping Identity updated its Federated Access Management technology. Designed to displace legacy Identity and Access Management infrastructures, this latest release includes …

Not all data breaches are created equal
1,673 data breaches led to 707 million data records being compromised worldwide during 2015, according to Gemalto’s Breach Level Index (BLI). The BLI is a global …

A third of IT managers admit to hacking
A high percentage of IT personnel admitted to not following the same security protocols they are expected to enforce, according to Absolute Software. Of those surveyed, 33% of …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems