Managing legacy medical devices that can no longer be patched

In this Help Net Security interview, Patty Ryan, Senior Director and CISO at QuidelOrtho, discusses how the long lifecycles of medical devices impact cybersecurity in healthcare environments. She explains... Read more »

Chain of security weaknesses found in smart air compressor model

Contractors and workshops often rely on air compressors to power their tools and keep projects running. But when those compressors are connected to the internet, convenience can introduce new... Read more »

Review: The Wireless Cookbook

The Wireless Cookbook is a project-centered guide to working with Wi-Fi, Bluetooth, and LoRa, written with the Raspberry Pi as the main platform. It is aimed at people who... Read more »

How to stop third-party risk from becoming your biggest headache

In this Help Net Security video, Robert Kraczek, Global IAM Strategist at One Identity, takes a deep dive into the growing problem of third-party cyber exposure and what it... Read more »

Cybersecurity jobs available right now: October 28, 2025

Analyst, Cybersecurity Threat Intelligence Brookfield Renewable | Canada | On-site – View job details As a Cybersecurity Threat Intelligence Analyst, you will run monthly vulnerability scans across IT and... Read more »

Albireo PCS delivers secure, managed cloud alternative to on-premise servers

Albireo Energy launched Private Cloud Services (PCS), a secure, fully managed cloud service designed to host and protect Building Automation System (BAS) and Energy Power Management Systems (EPMS) data... Read more »

Zumigo enhances fraud prevention with low-code tools and passwordless authentication

Zumigo has upgraded its solutions designed to help businesses fortify their defenses against rising sophisticated consumer fraud with an identity-first security approach. Recognizing that consumer and user access points... Read more »

Jumio introduces selfie.DONE to simplify digital identity verification

Jumio announced the launch of selfie.DONE, a new solution that delivers on the company’s vision for true reusable identity. selfie.DONE empowers trusted users to be instantly recognized and reverified... Read more »

eBook: A quarter century of Active Directory

Active Directory (AD) remains the backbone of enterprise identity and a prime target for attackers. Explore its 25-year history, evolving risks, and how organizations can modernize password security. This... Read more »

Ransomware, extortion groups adapt as payment rates reach historic lows

Ransomware groups are facing an economic downturn of their own: In Q3 2025, only 23 percent of victims paid a ransom, and for data theft incidents that involved no... Read more »
Subscribe to our Newsletter