Help Net Security
Top 3 security, privacy and data protection trends for 2015
2014 was full of front page stories about data privacy, hacks, data jurisdiction and other threats that confirmed security is no longer a niche. Security is officially a …
Internet of Things predictions for 2015
IDC provides organizations with insight and perspective on long-term industry trends along with new themes that may be on the horizon. IoT and the cloud. Within the next five …
Improving your readiness for OCR audits
In the wake of healthcare data breaches, OCR audits for HIPAA compliance have become more common – and the consequences have been more highly publicized. But many …
Best practices in knowledge-based authentication
Knowledge-based authentication (KBA) is a methodology gaining increasing recognition for providing the identity proofing part of user authentication. A group of senior IT pros …
Firefox 34 comes with critical security updates
Firefox 34 includes eight security updates, three of which are Critical, three High and two moderate. MSFA-2014-91 Privileged access to security wrapped protected objects …
The 2014 Firewall Buyers Guide
NOTE: This whitepaper is no longer available, thanks for your interest. Make an informed decision on the right firewall for your business with this guide from Palo Alto …
Coordinated cyber attacks on global critical infrastructure exposed
Cylance identified coordinated attacks by hackers based in Iran on more than 50 targets in 16 countries around the globe. Victim organizations were found in a variety of …
Data loss and downtime costs enterprises $1.7 trillion
Data loss and downtime cost enterprises $1.7 trillion in the last twelve months, or the equivalent of nearly 50% of Germany’s GDP. Data loss is up by 400% since 2012 …
Cost savings drive businesses to the cloud
A survey of C-Level senior executives, developers and other industry delegates has found that 72% of respondents identified cost as the key benefit of using the cloud for the …
Training kids to become infosec superheroes
Children today embark on life in two interconnected worlds, the physical and the virtual. And just as they need to learn how to be smart and safe in the physical world, they …
Cyber attacks impact purchasing behavior
As U.S. consumers head to malls and retail websites this holiday season, they do so increasingly concerned about the safety and security of their personal information. In …
Intel acquires digital identity manager PasswordBox
Intel acquired PasswordBox, a provider of a cross-platform identity management service that gives users a way to log into all of their websites and applications from any …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down