Help Net Security
Week in review: Security experts discuss Apple Pay, Salesforce hit with targeted attack
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Mobile forensics in a connected world In this interview, Andrew …
Securing virtual machines: Considerations for the hybrid cloud
With enterprises’ growing interest in adopting the hybrid cloud, Cloud Service Providers (CSPs) want to develop premium cloud offerings that fuel the rate of this …
Everything you need to know about POS malware
With this year’s dramatic uptick in data breaches targeting retailers and restaurant chains and, more specifically, the payment card data they process every day, …
Internet of Things to make CISOs redefine security efforts
By year-end 2017, over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of …
Most people still unconcerned about privacy threats
While cyber thieves continue to breach major corporations such as JP Morgan and, just last week, the Salvation Army and Home Depot, Americans still seem to be unconcerned …
Using thermal imaging for security
Do you work in counter surveillance or physical penetration testing? The physical security field in general? If yes, have you considered using a thermal imaging camera to help …
What security experts think about Apple Pay
Apple announced Apple Pay, a new category of service that works with iPhone 6 and iPhone 6 Plus through a NFC antenna design, a dedicated chip called the Secure Element, and …
Are free file storage solutions a safe bet for businesses?
The benefits of cloud computing are becoming increasingly recognized, and with this heightened understanding comes growing numbers of UK businesses that are embracing the use …
Apple built multi-factor authenticated payment in the right order
As an American living in Europe I have been perplexed at multi-factor authentication for payments. The Americans (laggards in my opinion) have been using magnetic stripe cards …
Cyber Security EXPO: Who, what and when
In today’s complex and always-connected world, attackers can exploit an increasing number of entry points to inflict damage to companies and individuals. With more and …
5 key things to consider when developing an enterprise mobility management strategy
To state the obvious, business success today is dependent on an organization’s ability to empower its mobile workforce. Corporate resources – including …
ISACA launches COBIT 5 online
ISACA launched the online version of COBIT 5, a resource center to improve governance and management of enterprise IT. The new online platform helps increase the utility of …