searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

Industry news

Get our top stories in your inbox

Discover Identity Theft Protection helps consumers protect their personal information

April 22, 2021

Discover announced Discover Identity Theft Protection, a fee-based identity theft protection product that provides individuals with credit and identity monitoring, alerts and …

VMware Anywhere Workspace provides secure experience to employees anywhere in the world

April 22, 2021

The way we work has changed forever. And now that leading companies have seen the benefits of remote work, they want to do more than just support it. They want to become truly …

Merlin Cyber Constellation GovCloud accelerates FedRAMP authorization for SaaS companies

April 22, 2021

Merlin Cyber launched Constellation GovCloud, a managed service that is designed to accelerate Federal Risk and Authorization Management Program (FedRAMP) authorization for …

Zerto Backup for SaaS powered by Keepit, manages and protects cloud SaaS data

April 22, 2021

Zerto announced the availability of Zerto Backup for SaaS powered by Keepit, an cloud backup and recovery solution designed to manage and protect cloud SaaS data covering some …

DataLocker SafeConsole Suites add key endpoint security and enterprise support features

April 22, 2021

DataLocker announced the release of two new suites, the SafeConsole Professional Suite and the SafeConsole Enterprise Suite. The new suites add key endpoint security and …

ADTRAN IoT Gateway based on LoRaWAN technology supports Smart Building applications

April 22, 2021

ADTRAN announced its Internet of Things (IoT) Gateway based on LoRaWAN technology. This micro-sized, Bluetooth-enabled gateway will enable LoRaWAN network operators, service …

Sequitur Labs helps IoT hardware manufacturers address technical, IP and supply chain challenges

April 22, 2021

While many businesses have invested in securing their data centers to ensure their protection from outside intruders, hacks and ransomware incidents, the vast majority have …

Storj DCS now helps developers build on the decentralized cloud with ease

April 22, 2021

Storj announced a new multi-tenant, S3-compatible gateway that enables developers to easily take advantage of the unsurpassed privacy and security benefits of Storj DCS …

CCC Digital Key Release 3.0 enables consumers to use their mobile device as a digital key hands-free

April 22, 2021

The Car Connectivity Consortium (CCC) announced that its Digital Key Release 3.0 specification – which adds Bluetooth Low Energy and Ultra Wideband (UWB) wireless connectivity …

Red Balloon Security expands set of offerings for critical infrastructure and a range of industries

April 22, 2021

Red Balloon Security announced an expanded and customizable set of offerings for critical infrastructure and a range of industries –– including energy, industrial control …

F5 enhances its application security portfolio to help protect customers against fraud and evolving threats

April 22, 2021

F5 announced enhancements to its application security portfolio. The new solutions highlight F5’s progressive approach to application security, enabling customers to deliver …

Abiquo 5.2 helps cloud users simplify tasks and workflow

April 22, 2021

Abiquo releases version 5.2, which delivers new functionalities for business competitive advantage along with new enhancements that help cloud users simplify tasks and …

Posts navigation

1 2 3 4 5 … 474
lock

How micro-segmentation creates an uphill battle for intruders

  • Securing vehicles from potential cybersecurity threats
  • Approaching zero trust security strategically
CISO’s guide to automating third-party cyber risk management

What's new

Monero

Monero-mining botnet targets orgs through recent MS Exchange vulnerabilities

Infosecurity transformation and building proactive mitigation strategies

organize

Outgunned CISOs navigate complex obstacles to keep rising attacks from turning into breaches

Cloud

Cloud Sniper: Manage and automate cloud security operations

Don't miss

Monero

Monero-mining botnet targets orgs through recent MS Exchange vulnerabilities

Cloud

Cloud Sniper: Manage and automate cloud security operations

lock

How micro-segmentation creates an uphill battle for intruders

SonicWall

Hackers found leveraging three SonicWall zero-day vulnerabilities

red

Attackers are exploiting zero-day in Pulse Secure VPNs to breach orgs (CVE-2021-22893)

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • Cloud Sniper: Manage and automate cloud security operations
  • How do I select an identity management solution for my business?
  • Securing vehicles from potential cybersecurity threats
  • Securing an online marketplace through the COVID-19-fueled boom

(IN)SECURE Magazine ISSUE 68 (March 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise