Category: Help Net Security

Scamnetic delivers fraud protection across all payment types

Scamnetic announced a new trajectory for its patented IDeveryone solution, capable of identity-proofing virtually anyone globally during a consumer or business payment. IDeveryone Payment Protection delivers extensive protection across all payment types, including push and digital payments, cryptocurrency, checks, wire…

Firmware scanning time, cost, and where teams run EMBA

Security teams that deal with connected devices often end up running long firmware scans overnight, checking progress in the morning, and trying to explain to colleagues why a single image consumed a workday of compute time. That routine sets the…

Product showcase: Orbot – Tor VPN for iOS

Orbot for iOS is a free, open-source networking tool that routes supported app traffic through the Tor network. Developed by the Guardian Project, it is intended for users who want to reduce tracking and limit network-level monitoring on iPhone and…

F5 NGINXaaS for Google Cloud protects cloud-native applications

F5 launched F5 NGINXaaS for Google Cloud, a cloud-native application delivery-as-a-service solution. Developed in collaboration with Google Cloud, this offering addresses the challenges of delivering modern and containerized applications by consolidating load balancing, security, and observability into a unified solution,…

Concentric AI releases Private Scan Manager for AWS GovCloud (US)

Concentric AI announced further expansion of the Private Scan Manager functionality in its Semantic Intelligence AI and data security governance platform to include AWS GovCloud (US). Government agencies, contractors, partners, and other organizations—including those that use Microsoft 365 Government Community…

Parrot OS shares its 2026 plans for security tools and platform support

Parrot OS is a Debian-based Linux distribution built for cybersecurity work. Security practitioners use it for penetration testing, digital forensics, malware analysis, and privacy-focused research. The operating system bundles security tools, development utilities, and privacy features into a maintained platform…

Teaching cybersecurity by letting students break things

Cybersecurity students show higher engagement when the work feels tangible. A new study from Airbus Cybersecurity and Dauphine University describes what happens when courses move beyond lectures and place students inside structured hacking scenarios, social engineering exercises, and competitive games.…

Turning cyber metrics into decisions leaders can act on

In this Help Net Security video, Bryan Sacks, Field CISO at Myriad360, explains how security leaders can measure cybersecurity in ways that matter to executives and boards. He argues that metrics should support decisions, not exist for reporting alone. The…

What insurers expect from cyber risk in 2026

Technology shifts, policy decisions, and attacker behavior are changing at the same time, and their effects increasingly overlap. Insurers, brokers, and security teams are feeling that pressure across underwriting, claims, and risk management. A new global study by CyberCube examines…