Help Net Security
5 key things to consider when developing an enterprise mobility management strategy
To state the obvious, business success today is dependent on an organization’s ability to empower its mobile workforce. Corporate resources – including …
ISACA launches COBIT 5 online
ISACA launched the online version of COBIT 5, a resource center to improve governance and management of enterprise IT. The new online platform helps increase the utility of …
Whitepaper: 5 steps to improve your network’s health
When the Heartbleed bug hit, companies and customers worldwide scrambled to assess if and how the bug affected them – and, where necessary, take the required steps to …
McAfee and Symantec join Cyber Threat Alliance
Fortinet and Palo Alto Networks, both original co-founders of the industry’s first cyber threat alliance, announced that McAfee and Symantec, have joined the alliance as …
Surge in cyberattacks targeting financial services firms
Cyberattacks targeting financial services firms are on the rise, but are these organizations doing enough to protect business and customer data? According to a Kaspersky Lab …
Ransomware rising, even on Android
The first half 2014 saw an increase in online attacks that lock up user data and hold it for ransom – even on mobile devices, according to F-Secure. Rising numbers of …
Typical home to contain 500 smart devices by 2022
The falling cost of adding sensing and communications to consumer products will mean that a typical family home, in a mature affluent market, could contain several hundred …
Week in review: Linux systems ensnared in DDoS botnet and Home Depot breach
Here’s an overview of some of last week’s most interesting news, podcasts, and articles: IT security is a matter of accountability The CEO has always had …
91% of Americans have privacy concerns
A new survey, conducted by Harris Poll among 2,100 U.S. adults and developed by WP Engine, discovered that 91% of Americans are concerned about their online privacy, while …
Profit leads motives for malware engineers
With mobile malware doubling year after year, NQ Mobile released new data and background information outlining the current threat landscape and projecting trends for the …
Network vulnerabilities IT admins can use to protect their network
Being able to adapt to change is one of the most important abilities in security today, mostly because attacks to defend against are able to do the same. The sophistication of …
5 tips for security behavior management programs
Security awareness has long been a point of frustration for information security professionals. While many organizations conduct awareness training of some kind, they have …
Featured news
Resources
Don't miss
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management