searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

Black Hat USA 2018

Get our top stories in your inbox

Should government officials complete basic cyber security training?

November 21, 2018

Venafi announced the results of a survey of 515 IT security professionals’ views on the cyber security literacy of government officials. The survey was conducted August 4-9, …

How to gain visibility with global IT asset inventory

September 17, 2018

In this podcast recorded at Black Hat USA 2018, Pablo Quiroga, Director of Product Management at Qualys, talks about how to gain unprecedented visibility with global IT asset …

Qualys Community Edition: Discover IT assets, manage vulnerabilities, scan web apps

September 6, 2018

In this podcast recorded at Black Hat USA 2018, Anthony Mogannam, Product Manager, SME/SMB Solutions at Qualys, talks about issues related to open source software and Qualys …

Incorporating sensitive asset data into your vulnerability and compliance program

August 28, 2018

In this podcast recorded at Black Hat USA 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about the importance of incorporating …

Secure your open source components automatically, continuously, and silently

August 22, 2018

In this podcast recorded at Black Hat USA 2018, Azi Cohen, General Manager at WhiteSource, talks about open source lifecycle management. WhiteSource manages open source …

How to develop the right strategy to increase IoT security

August 21, 2018

As more and more devices become connected, many industries that were previously secure are experiencing new threats or attacks to their devices and services. In this podcast …

Making informed decisions: The importance of data driven security

August 20, 2018

When deciding what product to buy, the information the vendor offers about the product is helpful, but not nearly enough: you need to analyze individual product results and …

Endpoint breach prevention by reducing attack surfaces

August 17, 2018

In this podcast recorded at Black Hat USA 2018, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about endpoint breach prevention by reducing …

Hack the Marine Corps bug bounty program kicks off

August 14, 2018

The U.S. Department of Defense (DoD) and HackerOne launched the Department’s sixth bug bounty program, Hack the Marine Corps. The bug bounty challenge will focus on Marine …

Vulnerabilities in mPOS devices could lead to fraud and theft

August 10, 2018

Vulnerabilities in mPOS (mobile point-of-sale) machines could allow malicious merchants to defraud customers and attackers to steal payment card data, Positive Technologies …

Social Mapper: A free tool for automated discovery of targets’ social media accounts

August 10, 2018

Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool …

IoT malware found hitting airplanes’ SATCOM systems

August 10, 2018

In 2014, IOActive researchers revealed security vulnerabilities they found in the most widely deployed satellite communications terminals and presented potential scenarios …

Posts navigation

1 2 3
arrows

Risky business: 3 timeless approaches to reduce security risk in 2021

  • Security starts with architecture
  • Proliferation of sneakerbots across industries: The long tail of DIY bot operators
March 2021 Patch Tuesday forecast: Off to an early start

What's new

person

Credential exposure trends: You need a better password

arrows

Risky business: 3 timeless approaches to reduce security risk in 2021

patch

March 2021 Patch Tuesday forecast: Off to an early start

stock price

Cybercriminals increasingly impersonate business-related apps

Don't miss

patch

March 2021 Patch Tuesday forecast: Off to an early start

arrows

Risky business: 3 timeless approaches to reduce security risk in 2021

person

Credential exposure trends: You need a better password

stock price

Cybercriminals increasingly impersonate business-related apps

building

Security starts with architecture

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • The economics behind global disinformation engines and strategies for mitigation
  • How do I select a cloud security solution for my business?
  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise