Help Net Security
New game sharpens secure coding skills
Today at Black Hat, Checkmarx launched Game of Hacks, a challenging game for software developers and security professionals to test their application hacking skills, improve …
Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program
Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight …
Competition to crack a virtual terrorist HDD, break into CCTV systems
Sophos is calling amateur security talent to turn sleuth and to investigate confiscated crime scene computer systems belonging to a cyber terrorist group as part of the latest …
Reactions to the Paddy Power data breach
Paddy Power is contacting 649,055 customers in relation to a data breach from 2010. The historical dataset contained individual customer’s name, username, address, email …
Top 10 Facebook scams
American singer and actress Taylor Swift has lost her scam mojo, as her fake sex tape spreading on Facebook was excluded from the top ten most successful scams, according to …
Do CISOs deserve a seat at the leadership table?
ThreatTrack Security published a survey study of C-level executives that underscores a hotly-debated topic in executive circles: what is the role of the CISO? “The …
Failure is an option
Information is the lifeblood of today’s business world. With timely and accurate information business decisions can be made quickly and confidently. Thanks to modern …
PCI compliance contributes to false sense of security
Despite industry data to the contrary, a new Tripwire retail cybersecurity survey indicates that organizations that rely on PCI compliance as the core of their information …
PC gamers increasingly under attack
Many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to …
Looking at insider threats from the outside
Cybersecurity is a never-ending battle requiring around-the-clock attention. From malware to DDoS to APT attacks, front-line IT security teams are being constantly bombarded. …
375 million customer records compromised in 2014
Between April and June of this year, there were a total of 237 breaches that compromised more than 175 million customer records of personal and financial information …
6 best practices to assure PCI compliance
With recent PCI DSS compliance incidents costing companies millions of pounds in fines and losses and inflicting damage to valuable brand reputations, Netwrix is urging …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military