Help Net Security
Trust in the U.S. cloud on the decline
Perspecsys revealed a continental cloud divide between the U.S. and Europe, based on data findings from a study it conducted at Infosecurity Europe 2014. Perspecsys surveyed …
POS facial recognition can prevent fraud
Lately, the news has been filled with stories of identify fraud. This, paired with the increase in mobile payments, furthers the need for companies to have access to enhanced …
Mobile app for single sign-on access to thousands of applications
Ping Identity announced a native mobile application that delivers single sign-on (SSO) access to thousands of applications from any device. Available for iOS and Android, the …
What are the biggest risks with the Internet of Things?
The majority of small businesses in the U.S. (82 percent) believe the Internet of Things (IoT) will bring fresh opportunities for their business, according to a new study …
Reactions to the eBay breach
A database containing eBay customers’ name, encrypted password, email address, physical address, phone number and date of birth was compromised. Here are some of the …
More enterprises to adopt multi-factor authentication
Rising security risks, and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions. A new SafeNet survey …
Hybrid cloud computing success factors
In the past three years, private cloud computing has moved from an aspiration to a tentative reality for nearly half of the world’s large organizations. Hybrid cloud …
Company and employee disconnect on BYOD security policies
Many employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns, according to Webroot. Key findings: …
Cybercrime attack targets, victims, motivations and methods
Trustwave experts gathered the data from 691 breach investigations (a 54 percent increase from 2012) across 24 countries in addition to proprietary threat intelligence gleaned …
Insider threat and privileged user abuse
Despite heightened awareness of insider threats, most organizations continue to grapple with how to mitigate risks to their networks and sensitive information. According to a …
Facebook offers free browser-based malware scanner
People share via social media more than any other channel. But with social media exploits of personal and corporate accounts frequently making headlines, it’s time for …
Legacy cybersecurity products failed to protect 97% of organizations
A new report examines attack data captured by FireEye security appliances from 1,217 organizations around the world from October 2013 to March 2014. Offering a unique glimpse …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE