Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
Accenture invests in Prevailion to provide clients with early warning of cyber threats

Accenture has made a strategic investment, through Accenture Ventures, in Prevailion, a next-generation cyber intelligence company that provides clients with expansive …

Shelley B. Leibowitz joins BitSight Board of Directors

BitSight announced it has appointed Shelley B. Leibowitz to its Board of Directors. Leibowitz is a seasoned director with more than two decades of prior experience in …

Elasticsearch
Elastic Stack 7.5.0 enhances enterprise search, observability, and security

Elastic, creators of Elasticsearch, released Elastic Stack 7.5.0, the latest version of the all-in-one datastore, search engine, and analytics platform. Along with the …

Endgame introduces Total Attack Lookback for incident review

Endgame has made critical threat intelligence data available to all customers free of charge through Total Attack Lookback – the forensic review feature to exceed average …

meltdown
Meltdown and Spectre: To patch or to concentrate on attack detection?

Patching to protect machines against Meltdown and Spectre attacks is going slow, and the provided patches, in some instances, lead to more problems than just slowdowns. In …

law enforcement
What the rise of cyber indictments means for 2018

The growing implementation of indictments throughout 2017 was arguably the most impactful government action to counter cyber attacks, and yet received little attention. In …

idea
We can’t rely on black swans: Three areas to improve cyber policy now

What will it take for cybersecurity policy to finally catch up to the digital age? I get this question often, and increasingly I worry that it will take a true “black swan” …

chess
Weaponizing machine learning to improve cyber defenses

As defensive technologies based on machine learning become increasingly numerous, so will offensive ones – whether wielded by attackers or pentesters. The idea is the …

tools
Utilizing hardware to stop attackers earlier and without disruption

Too often the defense community makes the mistake of focusing on the “what,” without considering and truly understanding the “why.” This mindset often leads to the development …

Don't miss

Cybersecurity news