Help Net Security
ISACA launches COBIT 5 online
ISACA launched the online version of COBIT 5, a resource center to improve governance and management of enterprise IT. The new online platform helps increase the utility of …
Whitepaper: 5 steps to improve your network’s health
When the Heartbleed bug hit, companies and customers worldwide scrambled to assess if and how the bug affected them – and, where necessary, take the required steps to …
McAfee and Symantec join Cyber Threat Alliance
Fortinet and Palo Alto Networks, both original co-founders of the industry’s first cyber threat alliance, announced that McAfee and Symantec, have joined the alliance as …
Surge in cyberattacks targeting financial services firms
Cyberattacks targeting financial services firms are on the rise, but are these organizations doing enough to protect business and customer data? According to a Kaspersky Lab …
Ransomware rising, even on Android
The first half 2014 saw an increase in online attacks that lock up user data and hold it for ransom – even on mobile devices, according to F-Secure. Rising numbers of …
Typical home to contain 500 smart devices by 2022
The falling cost of adding sensing and communications to consumer products will mean that a typical family home, in a mature affluent market, could contain several hundred …
Week in review: Linux systems ensnared in DDoS botnet and Home Depot breach
Here’s an overview of some of last week’s most interesting news, podcasts, and articles: IT security is a matter of accountability The CEO has always had …
91% of Americans have privacy concerns
A new survey, conducted by Harris Poll among 2,100 U.S. adults and developed by WP Engine, discovered that 91% of Americans are concerned about their online privacy, while …
Profit leads motives for malware engineers
With mobile malware doubling year after year, NQ Mobile released new data and background information outlining the current threat landscape and projecting trends for the …
Network vulnerabilities IT admins can use to protect their network
Being able to adapt to change is one of the most important abilities in security today, mostly because attacks to defend against are able to do the same. The sophistication of …
5 tips for security behavior management programs
Security awareness has long been a point of frustration for information security professionals. While many organizations conduct awareness training of some kind, they have …
80% of business users are unable to detect phishing scams
McAfee Labs revealed that phishing continues to be an effective tactic for infiltrating enterprise networks. Testing business users’ ability to detect online scams, the …
Featured news
Resources
Don't miss
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?