Help Net Security
                                Employee and HR data is the most commonly encrypted data
The use of encryption continues to grow in response to cyber-attacks, privacy compliance regulations and consumer concerns, and the majority of organizations plan to transfer …
                                War Room app for enterprise incident response and collaboration
Today at RSA Conference, Rook Security introduced War Room, an enterprise app that provides real-time unified incident and crisis management collaboration in the cloud. …
                                Minimize your organization’s threat exposure with Qualys ThreatPROTECT
At RSA Conference 2016, Qualys announced the Qualys ThreatPROTECT solution. Built on the Qualys Cloud Platform, ThreatPROTECT correlates data from vulnerability scans and …
                                Passwordless security for consumer-facing websites
At RSA Conference 2016, iovation launched its new Customer Authentication service that allows consumer-facing websites to enhance security while streamlining and improving the …
                                ThreatStream rebrands as Anomali, redefines threat intelligence
ThreatStream changed its name to Anomali and launched two new products at RSA Conference: Harmony Breach Analytics for mid-to-large enterprises and the Anomali Threat Analysis …
                                Phishing underground: Exploiting the human vulnerability
At the RSA Conference in San Francisco, PhishLabs exposed the murky evolution of a thriving, sophisticated phishing underworld. Their report is based on more than one million …
                                Are CIOs wasting millions on infosec that doesn’t work?
There’s overwhelming consensus among IT executives that the foundation of cybersecurity—cryptographic keys and digital certificates—is being left unprotected, leaving …
                                IoT wishes for RSA Conference 2016
With so many questions to be answered on the future of security and IoT, I’m happy to see that, once again, it’s that special time of the year when the collective movers and …
                                A mobile data breach could cost you $26.4 million
While data breaches make great headlines, what is often missing from those reports are the details on how the attackers got into the organization in the first place. Mobile …
                                The rise of polymorphic malware
97% of malware is unique to a specific endpoint, rendering signature-based security virtually useless. The data collected by Webroot throughout 2015 shows that today’s threats …
                                Week in review: Linux Mint hack, crypto ransomware hits hospitals, and educating policymakers on cybersecurity
Here’s an overview of some of last week’s most interesting news and articles: Can poorly designed embedded devices kill? The industry is not taking safety and …
                                Protecting enterprise data centers from threats that target Linux servers
Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down