Help Net Security
When to use tools for ISO 27001/ISO 22301 and when to avoid them
If you’re starting to implement complex standards like ISO 27001 or ISO 22301, you’re probably looking for a way to make your job easier. Who wouldn’t? After …
Targeting security weaknesses in the phone channel
Fraud over the phone channel is a significant problem for businesses, both small and large. Recently, phone hackers targeted a small architecture firm in Georgia, costing them …
Week in review: Critical Drupal 7 vulnerability, cloud myths, Ebola scams
Here’s an overview of some of last week’s most interesting news and articles: Tor exit node found patching downloaded binaries with malware A researcher has …
Things that freak out IT security pros
Ghosts and zombies aren’t the only things coming back from the dead this Halloween. Below is a list of the top security threats that organisations should be most aware …
SIEM doesn’t reduce security incidents, say IT pros
A survey of IT professional has shown that most organisations don’t audit their IT infrastructures and those that do don’t have complete details of who changed …
The security threat of unsanctioned file sharing
Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies …
Most orgs unprepared to handle a cyber incident
In the latest quarter, Solutionary SERT performed a broad analysis of the threat landscape, including information on the Shellshock and Aftershock vulnerabilities present in …
What’s jeopardizing the safety of your datacenter?
Datacenters are fraught with hidden operational hazards, and because virtual infrastructure is extremely complex and dynamic, many vulnerabilities go undetected and can be …
Biggest ever cyber security exercise in Europe is underway
More than 200 organisations and 400 cyber-security professionals from 29 European countries are testing their readiness to counter cyber-attacks in a day-long simulation, …
Photo gallery: McAfee FOCUS 14
Help Net Security attended McAfee’s Annual Security Conference FOCUS 14 that has been held this week at The Venetian and the Palazzo Congress Center in Las Vegas. …
Post Snowden, most users have changed Internet habits
On the heels of Edward Snowden’s advice to switch from Dropbox, Facebook and Google to services that place a high priority on security and privacy, F-Secure is releasing …
NIST Guide to Cyber Threat Information Sharing open for comments
NIST has announced the public comment release of Draft Special Publication (SP) 800-150, Guide to Cyber Threat Information Sharing. The purpose of this publication is to …
Featured news
Resources
Don't miss
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management
- Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel