Help Net Security
97% of Global 2000 remain vulnerable to due to Heartbleed
97 percent of Global 2000 organizations’ public-facing servers remain vulnerable to cyber attacks due to incomplete Heartbleed remediation, according to Venafi. This …
Continuous monitoring for enterprise incident response
Qualys has further bolstered its Continuous Monitoring (CM) cloud service. The latest features include automated alerts for changes in perimeter IP addresses, as well as a new …
Android Fake ID bug allows malware to impersonate trusted apps
The Bluebox Security research team has unearthed another critical Android vulnerability. Named “Fake ID,” the security bug can be used by malicious applications to …
Using Hollywood to improve your security program
I spend a lot of time on airplanes, and end up watching a lot of movies. Some of my favorite movies are adventures, spy stuff, and cunning heist movies. Recently, I realized …
Android ransomware attacks on the increase
CYREN researchers predict that a large wave of Android ransomware has yet to hit. Two cases of first-ever Android ransomware appeared thus far this year, both delivered via …
Layered security in the cloud
When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. …
The value of Bring Your Own Identity
New research shows that both the lines of business and IT departments see value in Bring Your Own Identity (BYOID) initiatives, where social networking or digital IDs are used …
Russian government offers money for Tor-cracking tech
The Russian Ministry of Internal Affairs (MVD) has published a tender offering $111,000 to any Russian company or organization that can provide technology that can …
What influences corporate security strategies?
Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of …
What is the primary driver for data lakes?
The growing hype surrounding data lakes is causing substantial confusion in the information management space, according to Gartner. Several vendors are marketing data lakes as …
Almost 1 in 10 Android apps are now malware
Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses, …
9 tips for communicating your BYOD policy
If an IT department creates a BYOD policy and no one at the company knows about it, does it actually make an impact? I’ll spare you the suspense – the answer is …
Featured news
Resources
Don't miss
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
 - How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI