Help Net Security
Are smart homes security smart?
A new ENISA study aims to identify both the security risks and challenges as well as the countermeasures required for emerging technologies in smart homes, providing a …
Which kind of security professional are you?
Much has been said and written about the arrogance prevalent in the computer industry, especially that of gamers and security professionals. A well-known female gamer recently …
Week in review: Anthem breach, critical IE 11 bug can be used for phishing attacks
Here’s an overview of some of last week’s most interesting news and articles: Overcoming the daily challenges of a security team The institutionalization of …
How can organizations guard against hackers in 2015?
Advanced persistent threats, malware sent via attachments, direct targeting of specific users through spear phishing techniques, vulnerabilities exploited to silently deliver …
Investigating online dating fraud
The one thing that online dating scammers have in common is that their preferred target demographic is vulnerable and trusting people with a limited social circle or support …
Analysis of 2014 Microsoft patch trend data
Tripwire announced an analysis of Microsoft patch data from 2014. “The 2014 data clearly shows that Microsoft is packing in more CVEs per bulletin in 2014,” said …
Reactions to the extensive Anthem data breach
Anthem, the second-largest health insurer in the United States, has suffered a data breach that may turn out to be the largest health care breach to date, as the compromised …
IT professional, hack thyself
To anyone not living under a rock, the increasing threat of a cyber attack is very plain. IT professionals spend sleepless nights worrying that they’ll be the next …
Infographic: The state of enterprise security
This infographic by SysCloud features cyber security trends in the enterprise and showcases how data breaches in the enterprise can be prevented. Click on the image below for …
Five key IT security trends for 2015
Here’s a look at five key IT security trends and solutions for 2015. Rise in security breaches The current high level of security breaches, from the largest organization …
The real challenge of the Internet of Things
More than 40 percent of organizations expect the Internet of Things (IoT) to transform their business or offer significant new revenue or cost-savings opportunities in the …
RSA Conference 2015: Challenging today’s security thinking
RSA Conference, the premiere series of global events, will once again set the stage for the world to talk – and challenge – information security trends for 2015, …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does