searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

BMW

Get our top stories in your inbox

Contrast Security raises $150M to advance application security

November 11, 2021

Contrast Security announced that it has closed $150M in a Series E round of funding at a greater than billion-dollar valuation. The oversubscribed round was led by Liberty …

Approov Alliance and Integration Program offers security solutions to protect APIs

August 27, 2021

Approov introduced the Approov Alliance and Integration Program to ensure that the critical elements of comprehensive mobile app API protection are rigorously tested and work …

D2iQ Kubernetes Platform now available in the Microsoft Azure Marketplace

July 13, 2021

D2iQ announced the availability of the D2iQ Kubernetes Platform (DKP), including D2iQ Kommander, D2iQ Konvoy, and D2iQ Kaptain, in the Microsoft Azure Marketplace, an online …

TeamViewer partners with SAP to drive digital transformation in industrial environments

June 15, 2021

TeamViewer announced a new partnership with SAP. The companies are joining forces to drive the digital transformation of workplaces and processes in industrial environments. …

Approov 2.7 delivers API cybersecurity protection for mobile-based applications

June 11, 2021

Approov introduced release 2.7 of the Approov API Shielding platform which lets companies of all sizes adopt leading-edge, affordable API cybersecurity protections for …

Researchers hack BMW cars, discover 14 vulnerabilities

May 23, 2018

Keen Security Lab researchers have discovered fourteen vulnerabilities affecting a variety of BMW car models. The flaws could be exploited to gain local and remote access to …

Featured news

  • Taking the right approach to data extortion
  • You should be able to trust organizations that handle your personal data
  • VMware issues critical fixes, CISA orders federal agencies to act immediately (CVE-2022-22972)
Easily migrate to the cloud with CIS Hardened Images

What's new

What does prioritizing cybersecurity at the leadership level entail?

Vishing cases reach all time high

Paying the ransom is not a good recovery strategy

How confident are CISOs about their security posture?

Don't miss

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

You should be able to trust organizations that handle your personal data

3 key elements to protect a Kubernetes cluster

Ransomware still winning: Average ransom demand jumped by 45%

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise