Help Net Security
Protecting the underground electronic communications infrastructure
ENISA has released a new report on the Protection of Underground Electronic Communications Infrastructure. This report – targeted at Member States (MS), public …
TorrentLocker exposed: Investigation and analysis
ESET researchers analyzed a widespread case of ransomware generally known as TorrentLocker, which started spreading in early 2014. The latest variant of the malware has …
How employees put your company at risk during the holidays
Most enterprises of any significant size have implemented security training programs, designed to teach employees how to avoid major security risks – phishing attacks …
76% of organizations have suffered a DNS attack
Seventy-six percent of organizations in the U.S. and U.K. have suffered a DNS attack, with 49 percent experiencing one in the past 12 months, according to Cloudmark. The most …
1 in 5 employees going rogue with corporate data
Companies around the world have reason to be worried about the use of cloud applications to share mission-critical information. In fact, 1 in 5 employees has uploaded …
eBook: Cybersecurity for Dummies
NOTE: This book is no longer available, thanks for your interest. APTs have changed the world of enterprise security and how networks and organizations are attacked. These …
Companies invested millions in privacy in 2014
As the number of data breaches in the U.S. reached 708 in 2014, new research shows that companies are investing millions in privacy and multiple business units are now …
The problem with security shortcuts
A combination of irresponsible user behavior and weaknesses in the protection of networks could create more risks for data breaches during the holiday period than at any other …
Web Application Firewall revenue to reach $777.3 million in 2018
The global Web application firewall (WAF) market was once primarily driven by regulatory requirements to protect Web applications and the sensitive customer data they collect. …
HIPAA security compliance: How risk tolerant are you?
At the heart of HIPAA lies a set of core security tenets for which every affected organization is responsible. These fundamentals are absolutely non-negotiable – but the …
Week in review: POODLE targeting TLS, insider threats, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews and articles: Software security in a market for lemons Programming has always been …
FIDO Alliance prepares for industry adoption of strong authentication in 2015
The FIDO (Fast IDentity Online) Alliance published final 1.0 drafts of its two specifications – Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F). …