Help Net Security
Who are the role models in cyberspace?
Those of us of who are of a certain age learned how to live our life by playing with our toys—our cars, dolls and, of course, Star Wars action figures. We were surrounded by …
Multi-factor authentication market will be worth US$1.6 billion by the end of 2015
ABI Research found that the global mobile multi-factor authentication software and service market will be worth US$1.6 billion by the end of 2015. Username and passwords have …
How to protect your identity this tax season
The majority of taxpayers will prioritize protecting their personal information this tax season, yet some safeguards go underused, according to Experian. Taxpayers are filing …
How a penetration test helps you meet PCI compliance guidelines
In order to protect credit card data, sometimes businesses have to think like a hacker. Every year, merchants who transmit, process, or store payment card data must conduct a …
The app economy demands a new security approach
Protection is still the main driver for security, but a new CA study reveals that organizations understand the application economy demands a new view and approach to security. …
What infosec can learn from the Greek elections
Sometimes disruption just happens. It occurs when something creates a dramatic change of direction, and examples are all around us: the introduction of the GUI, the iPod and …
Security outlook: Technologies and key trends
Anonymous threats and lone wolf attacks, increasing fears on cyber security and concerns over immigration will generate significant debate over foreign policy and how to …
Overcoming the daily challenges of a security team
The constantly evolving cyber threat landscape is resulting in new challenges and approaches for today’s security analyst teams. In the past, companies looked at the …
Do government initiatives increase security awareness?
New research, by SecureData and Vanson Bourne, investigated the impact government security initiatives had on end-user organizations in 2014, with nearly half (47%) reporting …
Week in review: How GitHub is redefining software development, Glibc bug, drone-hijacking malware
Here’s an overview of some of last week’s most interesting news, interviews and articles: VPN services blocked by China’s Great Firewall A number of popular …
Nearly half of all DDoS attacks use multiple attack vectors
Akamai released a new security report that provides analysis and insight into the global attack threat landscape including DDoS attacks. Akamai observed a 52 percent increase …
How to determine if insiders should be your primary concern
We learned throughout our lives that if we experience the same problem over and over again in a certain situation, we should probably change something in our own behavior / …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does