Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
mobile
Is zero-effort computer security a dream?

Researchers from the University of Alabama at Birmingham and Aalto University have found vulnerabilities in a recently proposed user-verification security system for …

embedded
Can poorly designed embedded devices kill?

The industry is not taking safety and security seriously enough, according to the Barr Group, who conducted a survey to better understand the state of safety- and …

cyber microscope
Cyber microscope enables advanced security anomaly detection

Lewis Rhodes Labs introduced the Cyber Microscope for faster and more accurate anomaly detection. The new product is based upon a Cyber Optimized Neuromorphic Processor that …

Phantom
Phantom: Security automation and orchestration platform

The Phantom platform can integrate existing security technologies and provide a layer of “connective tissue” between otherwise disparate systems. Phantom was …

Magnify
DB Networks partners with Cyphort and Security On-Demand

Big news from DB Networks, a provider of database cybersecurity products. They partnered with Cyphort to offer customers full spectrum visibility from the desktop and network …

Ping Identity
Ping Identity enhances its Federated Access Management technology

Ping Identity updated its Federated Access Management technology. Designed to displace legacy Identity and Access Management infrastructures, this latest release includes …

Match
Not all data breaches are created equal

1,673 data breaches led to 707 million data records being compromised worldwide during 2015, according to Gemalto’s Breach Level Index (BLI). The BLI is a global …

keyboard
A third of IT managers admit to hacking

A high percentage of IT personnel admitted to not following the same security protocols they are expected to enforce, according to Absolute Software. Of those surveyed, 33% of …

Binary
Internet of Evil Things: The growing risks of connected devices

As risk and concern around connected Internet of Things (IoT) devices continues to grow, resources and visibility into such connected devices have stagnated despite the …

Cloud
8 in 10 IT pros believe believe their data is safer in the cloud

Eight in 10 IT professionals and executives believe that when facing hardware malfunctions and environmental disasters, their organization’s data is safer in the cloud …

OptioLabs OptioInsight
Correlate real-time data from mobile devices across the enterprise

OptioLabs announced the availability of OptioInsight for enterprises using OptioCore-secured devices. OptioInsight correlates real-time data from mobile devices across the …

Niara dashboard
Utilize any data source to see attacks on the inside

Niara, a provider of security analytics for attack detection and incident response, announced that the latest release of its security analytics platform analyzes any data …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools