Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Cyber-Ark secures privileged accounts

Cyber-Ark Software announced its Privileged Identity Management Suite for Critical Infrastructure Protection (PIM/CIP), which secures critical infrastructure by preventing the …

Most effective ways to stop insider threat

Imperva examined the psychological, legal and technological tactics employed by leading organizations to mitigate insider threats, a class of enterprise risk perpetuated by a …

Verdasys launches Digital Guardian 6.1

Verdasys announced Digital Guardian 6.1, an information protection platform that integrates compliance, insider threat prevention and cyber threat prevention. The release also …

Insider threat in financial services sector

When it comes to preventing insider fraud, financial organizations would do well to more closely monitor experienced, mid-level employees with years on the job, according to a …

Online file sharing poses great security risks

As online file sharing becomes increasingly common as a business practice, SMBs are more at risk than ever before, according to Symantec. A new survey revealed that SMB …

Insider threat as prime security concern

Cyber-Ark Software revealed the findings of its annual “Trust, Security and Passwords” report. Whilst the research reveals a growing awareness of external threats …

Mobile devices expose company data to vulnerabilities

Mobilisafe announced results of its SMB focused study. As part of a private beta program, participants evaluated a product that assesses the security risk of mobile devices …

It’s official, corporate passwords are cheap

Nearly 50 per cent of employees would readily sell their corporate passwords for less than £5, according to Ping Identity. 30% would do the deed for even less, happily …

User activity monitoring crucial to minimizing security risks

In this ever evolving threat landscape, willing or unwitting insiders often play a key role in security compromises of organizations. It used to be that an …

Real-time session monitoring by Cyber-Ark

Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …

Employees are deliberately disabling security controls

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …

Programmer steals US government software source code

A Chinese computer programmer has been arrested in New York for having allegedly copied and stolen the source code of software developed by the US Treasury Department, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools