Help Net Security
Whitepaper: CISOs secret weapon for reducing enterprise risk
Security events happen to the best of organizations. Business and data move at lightning-speed, and CISOs have to not only keep pace with current risks, but anticipate future …
Critical factors in preventing data breaches
McAfee issued a new report that assesses organizations’ abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and …
One-in-four have been victims of identity theft
Identity theft has ranked as the top concern amongst consumers questioned about their digital lifestyles, according to Centrify. The survey of 1,000 UK consumers, reveals that …
Top 5 fraud risk areas in the workplace
Limited knowledge and awareness about what constitutes confidential information is putting UK businesses at risk of falling victim to fraud if these materials are not securely …
TRUSTe deceived consumers through its privacy seal program
TRUSTe has agreed to settle Federal Trade Commission charges that it deceived consumers about its recertification program for company’s privacy practices, as well as …
ReadyNAS OS offers 5 levels of data protection
NETGEAR is releasing a new version of its ReadyNAS operating system for its ReadyNAS family of desktop and rack-mount NAS devices. ReadyNAS OS 6.2 offers improvements in data …
Most of the top 100 paid Android and iOS apps have been hacked
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies. In addition to an increase in app hacks …
How to become an ISO 27001 / ISO 22301 consultant
If you are thinking about a career change, becoming an independent consultant for ISO 27001 and/or ISO 22301 certainly sounds like an attractive option. But what do you need …
Week in review: Obama backs net neutrality, Darkhotel espionage, working at Pwnie Express
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Darkhotel espionage campaign targets corporate executives …
Toshiba and Cisco to collaborate on new ways to utilize IoT
Toshiba and Cisco are collaborating on new ways to utilize the Internet of Everything that can dramatically improve processes, productivity and experiences in manufacturing, …
Enabling secure file sharing in the enterprise
As enterprise mobility meets collaboration, the workplace as we know it is transforming. Gone are the days when employees stopped working after leaving the office or …
Secure remote file access challenges
While the majority of full-time employees access files remotely (89%), nearly three-quarters (73%) still do so via email, and less than a quarter (22%) are aware of a …
Featured news
Resources
Don't miss
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management
- Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)