Help Net Security
Consumers increasingly blame companies for data breaches
Moving forward, every company involved in a major data breach—those actually attacked, such as retailers Home Depot, Target, Goodwill and Neiman Marcus, as well as banks, …
Five of the biggest data myths debunked
With so much hype about big data, it’s hard for IT leaders to know how to exploit its potential. Gartner dispels five myths to help IT leaders evolve their information …
UK employees targeted with fake policy violation emails
A new cyber-crime attack has been tricking SMB employees in the UK into downloading Trojans by accusing them of violating company policy. The spam wave started to accelerate …
Energy IT pros show surprising optimism
Tripwire announced the results of a survey of 104 attendees at the EnergySec Security Summit in Texas. Industry research shows most breaches go undiscovered for weeks, months …
Mitigations for Spike DDoS toolkit-powered attacks
Akamai Technologies released, through the company’s Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory that alerts …
Training for CISSP and other (ISC)2 certifications
(ISC)2’s CISSP Live OnLine CBK Training Seminar gives you the same award-winning course content as the classroom-based seminars and the benefit of an (ISC)2 Authorised …
We can fix security, but it’s not going to be easy
When I think about computer security, I like to go back to its early days and compare the situation then with the situation now. Taking a step back is very useful because, …
Emerging international data privacy challenges
According to a new survey from the Cloud Security Alliance there is a growing and strong interest in harmonizing privacy laws towards a universal set of principles. …
Companies becoming lax in managing BYOD risk
Exposure to risk is as much of a threat today as it was in 2013; however, organizations have become less diligent in BYOD management and mitigation, according to TEKsystems. …
Board practices regarding IT oversight and cybersecurity
Greater director involvement in social media oversight, concern about the Department of Homeland Security/NIST cybersecurity frameworks and increased use of IT consultants are …
Top tips to protect systems against insider misuse
The 2014 Verizon Data Breach Investigations Report revealed a disturbing trend, which is the fact that users’ access rights have become a weak point in the security …
High-volume DDoS attacks on the rise
A continuing trend of DDoS attacks are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of …
Featured news
Resources
Don't miss
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?