The Hacker News Logo
Click to Subscribe

The Hacker News — Latest Cyber Security News: enterprise security

The Comprehensive Compliance Guide (Get Assessment Templates)

The Comprehensive Compliance Guide (Get Assessment Templates)

November 13, 2019The Hacker News
Complying with cyber regulations forms a significant portion of the CISO's responsibility. Compliance is, in fact, one of the major d...
PPT Template: Build Your 2020 Security Plan

PPT Template: Build Your 2020 Security Plan

November 05, 2019The Hacker News
The end of the year is coming, and it's time for security decision-makers to make plans for 2020 and get management approval. Typical...
Cynet 360: The Next Generation of EDR

Cynet 360: The Next Generation of EDR

September 24, 2019The Hacker News
Many organizations regard Endpoint Detection and Response (EDR) as their main protection against breaches. EDR, as a category, emerged in 20...
How Cloud-Based Automation Can Keep Business Operations Secure

How Cloud-Based Automation Can Keep Business Operations Secure

September 16, 2019The Hacker News
The massive data breach at Capital One – America's seventh-largest bank, according to revenue – has challenged many common assumption...
CISO Kit — Breach Protection in the Palm of Your Hand

CISO Kit — Breach Protection in the Palm of Your Hand

September 11, 2019The Hacker News
CISOs and CIOs need to know better than anyone the security pulse of their organizations. On the other hand, they cannot be flooded with eve...
New Free Offering Enables Any MSP and Security Integrator to Add Incident Response to their Services Portfolio

New Free Offering Enables Any MSP and Security Integrator to Add Incident Response to their Services Portfolio

September 04, 2019The Hacker News
The Incident Response (IR) services market is in accelerated growth due to the rise in cyberattacks that result in breaches. More and mor...
Engage Your Management with the Definitive 'Security for Management' Presentation Template

Engage Your Management with the Definitive 'Security for Management' Presentation Template

July 16, 2019The Hacker News
In every organization, there is a person who's directly accountable for cybersecurity. The name of the role varies per the organizati...
Cynet Launches Free Offering For Incident Response Service Providers

Cynet Launches Free Offering For Incident Response Service Providers

July 09, 2019The Hacker News
More and more, organizations take the route of outsourcing incident response to Managed Security Service Providers. This trend is disti...
5 Keys to Improve Your Cybersecurity

5 Keys to Improve Your Cybersecurity

June 18, 2019The Hacker News
Cybersecurity isn't easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity p...
Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities

Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities

June 12, 2019The Hacker News
Real-time visibility into IT assets and activities introduces speed and efficiency to many critical productivity and security tasks organ...
When Time is of the Essence – Testing Controls Against the Latest Threats Faster

When Time is of the Essence – Testing Controls Against the Latest Threats Faster

June 12, 2019The Hacker News
A new threat has hit head the headlines ( Robinhood anyone?), and you need to know if you're protected right now. What do you do? ...
5 Cybersecurity Tools Every Business Needs to Know

5 Cybersecurity Tools Every Business Needs to Know

May 23, 2019The Hacker News
Cybersecurity experts all echo the same thing – cyber attacks are going to get more rampant, and they will continue to pose severe threats a...
WEBINAR: How to Get Enterprise Cyber Security for your Mid-Sized Organization

WEBINAR: How to Get Enterprise Cyber Security for your Mid-Sized Organization

May 21, 2019The Hacker News
High-quality cybersecurity posture is typically regarded as the exclusive domain of the large and heavy resourced enterprises – those who...
How Endpoint Management Can Keep Workplace IT Secure

How Endpoint Management Can Keep Workplace IT Secure

April 01, 2019The Hacker News
Workplaces have become highly connected. Even a small business could have dozens of devices in the form of desktops, mobile devices, route...
Exclusive Deals

Stay Informed — Newsletter Sign Up

Sign up for THN newsletter and get our latest stories delivered straight to your inbox.