searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

NSA

Get our top stories in your inbox

Microsoft fixes actively exploited zero-day reported by the NSA (CVE-2022-24521)

April 12, 2022

On this April 2022 Patch Tuesday, Microsoft has released patches for 128 CVE-numbered vulnerabilities, including one zero-day exploited in the wild (CVE-2022-24521) and …

KSOC announces that its Kubernetes security platform supports hardening NSA/CISA guidelines

March 31, 2022

KSOC announced that their platform satisfies the Kubernetes hardening guidelines issued by the National Security Agency (NSA) and Cybersecurity and Infrastructure Security …

Dragos partners with NSA and CISA to increase OT cybersecurity for United States critical infrastructure

February 16, 2022

Dragos has announced initiatives with the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) to strengthen security and visibility …

The dangers behind wildcard certificates: What enterprises need to know

October 27, 2021

With the National Security Agency recently issuing guidance on the risks associated with wildcard TLS certificates and Application Layer Protocols Allowing Cross-Protocol …

Huntress launches endpoint protection capabilities to defend SMBs from cyberattacks

October 13, 2021

Huntress launched a series of platform enhancements designed to protect small and midsize businesses (SMBs) from modern cyberthreats. The release includes the general …

ARMO adds MITRE ATT&CK framework to its open-source Kubernetes testing tool

October 13, 2021

ARMO released an expanded version Kubescape, an open-source testing tool for Kubernetes environments that is compliant with the standards set forth in the Kubernetes Hardening …

IriusRisk expands its Technical Advisory Board with three new members

September 23, 2021

IriusRisk has added three new members to its Technical Advisory Board to help inform the development of its automated threat modeling platform and address the software …

Chris Cochran and Ron Eddings join Axonius as Creative Directors

August 29, 2021

Axonius announced that Chris Cochran and Ron Eddings, highly experienced security professionals and the producers and hosts of the popular Hacker Valley Studio podcast, have …

Kubescape helps admins manage Kubernetes securely

August 24, 2021

Kubescape is an open-source tool for testing if Kubernetes is deployed securely, as defined in the recently released Kubernetes Hardening Guidance by NSA and CISA. About …

How to harden Kubernetes systems and minimize risk

August 9, 2021

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released a report which details threats to Kubernetes environments and …

Manufacturers turning to zero trust to better secure their networks

July 23, 2021

In response to the 62% global increase in ransomware since 2019 (158% increase in North America) and over 40% of manufacturing firms suffering a cyberattack last year, Onclave …

MITRE D3FEND: Enabling cybersecurity pros to tailor defenses against specific cyber threats

June 24, 2021

D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats is now available through MITRE. NSA funded MITRE’s research for D3FEND to …

Posts navigation

1 2 3 4 5 … 15

Featured news

  • Taking the right approach to data extortion
  • You should be able to trust organizations that handle your personal data
  • VMware issues critical fixes, CISA orders federal agencies to act immediately (CVE-2022-22972)
Easily migrate to the cloud with CIS Hardened Images

What's new

What does prioritizing cybersecurity at the leadership level entail?

Vishing cases reach all time high

Paying the ransom is not a good recovery strategy

How confident are CISOs about their security posture?

Don't miss

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

You should be able to trust organizations that handle your personal data

3 key elements to protect a Kubernetes cluster

Ransomware still winning: Average ransom demand jumped by 45%

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise