The Hacker News Logo
Click to Subscribe

The Hacker News — Latest Cyber Security, Hacking & Tech News: cyber security software

CISO Kit — Breach Protection in the Palm of Your Hand

CISO Kit — Breach Protection in the Palm of Your Hand

September 11, 2019The Hacker News
CISOs and CIOs need to know better than anyone the security pulse of their organizations. On the other hand, they cannot be flooded with eve...
New Free Offering Enables Any MSP and Security Integrator to Add Incident Response to their Services Portfolio

New Free Offering Enables Any MSP and Security Integrator to Add Incident Response to their Services Portfolio

September 04, 2019The Hacker News
The Incident Response (IR) services market is in accelerated growth due to the rise in cyberattacks that result in breaches. More and mor...
5 Cybersecurity Tools Every Business Needs to Know

5 Cybersecurity Tools Every Business Needs to Know

May 23, 2019The Hacker News
Cybersecurity experts all echo the same thing – cyber attacks are going to get more rampant, and they will continue to pose severe threats a...
Cynet's Free Incident Response Tool — Stop Active Attacks With Greater Visibility

Cynet's Free Incident Response Tool — Stop Active Attacks With Greater Visibility

May 07, 2019The Hacker News
The saying that there are two types of organizations, those that have gotten breached and those who have but just don't know it yet, h...
NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

April 04, 2019Swati Khandelwal
Update (4/4/2019) — Great news. NSA today finally released the complete source code for GHIDRA version 9.0.2 which is now available o...
Cynet Offers Free Threat Assessment for Mid-Sized and Large Organizations

Cynet Offers Free Threat Assessment for Mid-Sized and Large Organizations

April 03, 2019The Hacker News
Visibility into an environment attack surface is the fundamental cornerstone to sound security decision making. However, the standard pr...
How Endpoint Management Can Keep Workplace IT Secure

How Endpoint Management Can Keep Workplace IT Secure

April 01, 2019The Hacker News
Workplaces have become highly connected. Even a small business could have dozens of devices in the form of desktops, mobile devices, route...
Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV

Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV

March 28, 2019The Hacker News
Doing business in today's connected world means dealing with a continually evolving threat landscape. With potential losses due to ...
Get 4 Essential CyberSecurity Software For Less Than $10 Per Month

Get 4 Essential CyberSecurity Software For Less Than $10 Per Month

March 22, 2019The Hacker News
Major data breaches and cyber attacks are occurring at an alarming rate, and if you are still not using a VPN and password manager app, y...
Google Launches Backstory — A New Cyber Security Tool for Businesses

Google Launches Backstory — A New Cyber Security Tool for Businesses

March 05, 2019Swati Khandelwal
Google's one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory , a cloud-based ...
Why you need to know about Penetration Testing and Compliance Audits?

Why you need to know about Penetration Testing and Compliance Audits?

November 15, 2018Wang Wei
We live in an age where data flows like water, becoming the new life source of our everyday ventures. As such, you can just imagine what a...
Cynet Review: Simplify Security with a True Security Platform

Cynet Review: Simplify Security with a True Security Platform

November 13, 2018Mohit Kumar
In 1999, Bruce Schneier wrote, "Complexity is the worst enemy of security." That was 19 years ago (!) and since then, cyber se...
Exclusive Deals

Stay Informed — Newsletter Sign Up

Sign up for THN newsletter and get our latest stories delivered straight to your inbox.