The Hacker News Logo
Click to Subscribe

The Hacker News — Latest Cyber Security, Hacking & Tech News: enterprise security

How Cloud-Based Automation Can Keep Business Operations Secure

How Cloud-Based Automation Can Keep Business Operations Secure

September 16, 2019The Hacker News
The massive data breach at Capital One – America's seventh-largest bank, according to revenue – has challenged many common assumption...
CISO Kit — Breach Protection in the Palm of Your Hand

CISO Kit — Breach Protection in the Palm of Your Hand

September 11, 2019The Hacker News
CISOs and CIOs need to know better than anyone the security pulse of their organizations. On the other hand, they cannot be flooded with eve...
New Free Offering Enables Any MSP and Security Integrator to Add Incident Response to their Services Portfolio

New Free Offering Enables Any MSP and Security Integrator to Add Incident Response to their Services Portfolio

September 04, 2019The Hacker News
The Incident Response (IR) services market is in accelerated growth due to the rise in cyberattacks that result in breaches. More and mor...
Engage Your Management with the Definitive 'Security for Management' Presentation Template

Engage Your Management with the Definitive 'Security for Management' Presentation Template

July 16, 2019The Hacker News
In every organization, there is a person who's directly accountable for cybersecurity. The name of the role varies per the organizati...
Cynet Launches Free Offering For Incident Response Service Providers

Cynet Launches Free Offering For Incident Response Service Providers

July 09, 2019The Hacker News
More and more, organizations take the route of outsourcing incident response to Managed Security Service Providers. This trend is disti...
5 Keys to Improve Your Cybersecurity

5 Keys to Improve Your Cybersecurity

June 18, 2019The Hacker News
Cybersecurity isn't easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity p...
Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities

Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities

June 12, 2019The Hacker News
Real-time visibility into IT assets and activities introduces speed and efficiency to many critical productivity and security tasks organ...
When Time is of the Essence – Testing Controls Against the Latest Threats Faster

When Time is of the Essence – Testing Controls Against the Latest Threats Faster

June 12, 2019The Hacker News
A new threat has hit head the headlines ( Robinhood anyone?), and you need to know if you're protected right now. What do you do? ...
5 Cybersecurity Tools Every Business Needs to Know

5 Cybersecurity Tools Every Business Needs to Know

May 23, 2019The Hacker News
Cybersecurity experts all echo the same thing – cyber attacks are going to get more rampant, and they will continue to pose severe threats a...
WEBINAR: How to Get Enterprise Cyber Security for your Mid-Sized Organization

WEBINAR: How to Get Enterprise Cyber Security for your Mid-Sized Organization

May 21, 2019The Hacker News
High-quality cybersecurity posture is typically regarded as the exclusive domain of the large and heavy resourced enterprises – those who...
How Endpoint Management Can Keep Workplace IT Secure

How Endpoint Management Can Keep Workplace IT Secure

April 01, 2019The Hacker News
Workplaces have become highly connected. Even a small business could have dozens of devices in the form of desktops, mobile devices, route...
Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV

Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV

March 28, 2019The Hacker News
Doing business in today's connected world means dealing with a continually evolving threat landscape. With potential losses due to ...
Ransomware Attack Forces Aluminum Manufacturer to Shutdown Systems Worldwide

Ransomware Attack Forces Aluminum Manufacturer to Shutdown Systems Worldwide

March 19, 2019Mohit Kumar
Photo by Terje Pedersen / NTB scanpix One of the world's largest producers of aluminum has been forced to shut down several of its ...
Citrix Data Breach – Iranian Hackers Stole 6TB of Sensitive Data

Citrix Data Breach – Iranian Hackers Stole 6TB of Sensitive Data

March 11, 2019Swati Khandelwal
Popular enterprise software company Citrix that provides services to the U.S. military, the FBI, many U.S. corporations, and various U....
Google Launches Backstory — A New Cyber Security Tool for Businesses

Google Launches Backstory — A New Cyber Security Tool for Businesses

March 05, 2019Swati Khandelwal
Google's one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory , a cloud-based ...
Learn How XDR Can Take Breach Protection Beyond Endpoint Security

Learn How XDR Can Take Breach Protection Beyond Endpoint Security

February 19, 2019The Hacker News
How do you know whether an attacker has infiltrated your network? Can you really rely on an Endpoint Detection and Response (EDR) solution...
How to Secure Your Mid-Size Organization From the Next Cyber Attack

How to Secure Your Mid-Size Organization From the Next Cyber Attack

January 15, 2019Mohit Kumar
If you are responsible for the cybersecurity of a medium-sized company , you may assume your organization is too small to be targeted. Wel...
Exclusive Deals

Stay Informed — Newsletter Sign Up

Join over 350,000 information security professionals to get the latest news and tips straight to your inbox.