searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

Cobalt

Get our top stories in your inbox

Saltworks partners with Secure Code Warrior on secure coding for DevOps

March 23, 2021

Saltworks announced a partnership with Secure Code Warrior to elevate the importance and accessibility of secure code education and skills development. By helping developers …

Cobalt Partner Program offers new opportunities for partners

March 15, 2021

Cobalt announced the launch of its Partner Program. The program comes amid massive customer demand as organizations realize the need for an optimized and streamlined …

Cobalt names Eric Brinkman as Chief Product Officer

February 26, 2021

Cobalt announced it has named Eric Brinkman as its new Chief Product Officer. In this role, Brinkman will lead Cobalt’s product vision, enhancing the existing suite of …

Get your free ticket to Cobalt’s SecTalks virtual conference

February 9, 2021

How can military experience help build resilience in information security? What lessons in perseverance and resilience can we pick up from an aerospace consultant who learned …

What’s at stake in the Computer Fraud and Abuse Act (CFAA)

December 14, 2020

Two weeks ago, the Supreme Court heard oral arguments in Van Buren vs. United States, the landmark case over the Computer Fraud and Abuse Act (CFAA). Nathan Van Buren, the …

Q&A session: Examples of what it takes to achieve DevSecOps maturity

November 12, 2020

Join Cobalt for an interactive 1-hour Q&A session that tackles real-life examples of what it takes to achieve DevSecOps maturity. In the security corner will be Caroline …

New additions to RSA Conference Advisory Board bring wealth of industry knowledge

November 13, 2018

RSA Conference, the world’s leading information security conferences and expositions, today announced the addition of nine new members to its Advisory Board for a total of 16 …

ShiftLeft demonstrates application protection in the first test of its kind

August 8, 2018

ShiftLeft announced the public real-world benchmark of its application security solution. The test measured ShiftLeft’s ability to protect an application against exploit …

Why you need a tailored application security program

February 8, 2017

For companies that provide applications to their customers, keeping those applications secure is a must. Setting up an application security program is the next logical step, …

zero

Approaching zero trust security strategically

  • Product showcase: Accurics
  • Digital business requires a security-first mindset
CISO’s guide to automating third-party cyber risk management

What's new

Facebook

Facebook Messenger users targeted by a large-scale scam

Panorays guide

CISO’s guide to automating third-party cyber risk management

zero

Approaching zero trust security strategically

lock

Consumer data protection is a high priority, but there’s still work to be done

Don't miss

Facebook

Facebook Messenger users targeted by a large-scale scam

zero

Approaching zero trust security strategically

Accurics

Product showcase: Accurics

lock

Consumer data protection is a high priority, but there’s still work to be done

Panorays guide

CISO’s guide to automating third-party cyber risk management

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • Securing an online marketplace through the COVID-19-fueled boom
  • How do I select an attack detection solution for my business?
  • Zero Trust creator talks about implementation, misconceptions, strategy
  • How do I select a bot protection solution for my business?

(IN)SECURE Magazine ISSUE 68 (March 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise