The Hacker News Logo
Click to Subscribe

The Hacker News - Cybersecurity News and Analysis: Search results for Security

The Ultimate 2019 Security Team Assessment Template

The Ultimate 2019 Security Team Assessment Template

November 20, 2019The Hacker News
Assessing the performance of your security team is critical to both knowing your current posture, as well as planning ahead. ' The ...
PPT Template: Build Your 2020 Security Plan

PPT Template: Build Your 2020 Security Plan

November 05, 2019The Hacker News
The end of the year is coming, and it's time for security decision-makers to make plans for 2020 and get management approval. Typical...
Google 'Titan Security Key' Is Now On Sale For $50

Google 'Titan Security Key' Is Now On Sale For $50

August 31, 2018Swati Khandelwal
Google just made its Titan Security Key available on its store for $50. First announced last month at Google Cloud Next '18 convent...
Microsoft built its own custom Linux OS to secure IoT devices

Microsoft built its own custom Linux OS to secure IoT devices

April 17, 2018Swati Khandelwal
Finally, it's happening. Microsoft has built its own custom Linux kernel to power " Azure Sphere ," a newly launched tech...
Gartner Says the Future of Network Security Lies with SASE

Gartner Says the Future of Network Security Lies with SASE

November 07, 2019The Hacker News
Cloud services and networking are driving the concept of digital businesses, yet traditional networking and cybersecurity architectures a...
CISSP Certification Course — Become An IT Security Professional

CISSP Certification Course — Become An IT Security Professional

September 06, 2018The Hacker News
If you dream of making it big in the IT security community, the CISSP certification is a necessary milestone. Certified Information Sys...
D-Link Agrees to 10 Years of Security Audits to Settle FTC Charges

D-Link Agrees to 10 Years of Security Audits to Settle FTC Charges

July 03, 2019Swati Khandelwal
Taiwanese networking equipment manufacturer D-Link has agreed to implement a "comprehensive software security program" in order...
Bluetooth Flaw Found in Google Titan Security Keys; Get Free Replacement

Bluetooth Flaw Found in Google Titan Security Keys; Get Free Replacement

May 16, 2019Swati Khandelwal
A team of security researchers at Microsoft discovered a potentially serious vulnerability in the Bluetooth-supported version of Google&#...
Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable

Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable

September 13, 2017Swati Khandelwal
Microsoft has been expressing its love for Linux for almost three years now, and this love costs Microsoft an arm and a leg. Last year,...
Cybersecurity Frameworks — Types, Strategies, Implementation and Benefits

Cybersecurity Frameworks — Types, Strategies, Implementation and Benefits

July 12, 2019Giridhara Raam
Organizations around the world are wondering how to become immune from cyber attacks which are evolving every day with more sophisticated...
4 Best Free Online Security Tools for SMEs in 2020

4 Best Free Online Security Tools for SMEs in 2020

November 14, 2019The Hacker News
Cyberattacks on small and midsized companies in 2019 cost $200,000 per company on average, mercilessly putting many of them out of busin...
How to Start a Career in Cybersecurity: All You Need to Know

How to Start a Career in Cybersecurity: All You Need to Know

October 08, 2018Mohit Kumar
Cybersecurity is one of the most dynamic and exciting fields in tech, combining cutting-edge information technology with crime fighting. I...
Firewall Bursting: A New Approach to Better Branch Security

Firewall Bursting: A New Approach to Better Branch Security

December 18, 2017Wang Wei
One of the most common network security solutions is the branch firewall. Branch firewall appliances can pack into a single device a wide...
Exclusive Deals

Stay Informed — Newsletter Sign Up

Sign up for THN newsletter and get our latest stories delivered straight to your inbox.