Help Net Security
Reactions to the extensive Anthem data breach
Anthem, the second-largest health insurer in the United States, has suffered a data breach that may turn out to be the largest health care breach to date, as the compromised …
IT professional, hack thyself
To anyone not living under a rock, the increasing threat of a cyber attack is very plain. IT professionals spend sleepless nights worrying that they’ll be the next …
Infographic: The state of enterprise security
This infographic by SysCloud features cyber security trends in the enterprise and showcases how data breaches in the enterprise can be prevented. Click on the image below for …
Five key IT security trends for 2015
Here’s a look at five key IT security trends and solutions for 2015. Rise in security breaches The current high level of security breaches, from the largest organization …
The real challenge of the Internet of Things
More than 40 percent of organizations expect the Internet of Things (IoT) to transform their business or offer significant new revenue or cost-savings opportunities in the …

RSA Conference 2015: Challenging today’s security thinking
RSA Conference, the premiere series of global events, will once again set the stage for the world to talk – and challenge – information security trends for 2015, …
Who are the role models in cyberspace?
Those of us of who are of a certain age learned how to live our life by playing with our toys—our cars, dolls and, of course, Star Wars action figures. We were surrounded by …
Multi-factor authentication market will be worth US$1.6 billion by the end of 2015
ABI Research found that the global mobile multi-factor authentication software and service market will be worth US$1.6 billion by the end of 2015. Username and passwords have …
How to protect your identity this tax season
The majority of taxpayers will prioritize protecting their personal information this tax season, yet some safeguards go underused, according to Experian. Taxpayers are filing …
How a penetration test helps you meet PCI compliance guidelines
In order to protect credit card data, sometimes businesses have to think like a hacker. Every year, merchants who transmit, process, or store payment card data must conduct a …
The app economy demands a new security approach
Protection is still the main driver for security, but a new CA study reveals that organizations understand the application economy demands a new view and approach to security. …
What infosec can learn from the Greek elections
Sometimes disruption just happens. It occurs when something creates a dramatic change of direction, and examples are all around us: the introduction of the GUI, the iPod and …