Help Net Security
Global cost of data breach goes up by 15 percent
The average consolidated total cost of a data breach increased 15 percent in the last year to $3.5 million, say the results of Ponemon Institute’s ninth annual Cost of …
Mobile phone security transformed with 4 new encryption apps
Following the high profile breaches of mobile phone security that have hit the headlines in recent years, a British company has launched a new range of mobile phone apps that …
NIST updates Transport Layer Security (TLS) guidelines
The National Institute of Standards and Technology (NIST) has released an update to a document that helps computer administrators maintain the security of information …
Week in review: IE 0-day patched, Windows XP gets unexpected update, and tips on how to learn information security
Here’s an overview of some of last week’s most interesting news, reviews and articles: XSS bug in popular Chinese site exploited to launch DDoS attack DDoS …
Red Hat to acquire open source storage systems’ firm Inktank
Red Hat announced that it has signed a definitive agreement to acquire Inktank, a provider of scale-out, open source storage systems. Inktank’s flagship technology, …
SANS revamps its Memory Analysis Course
To provide digital forensic and incident response professionals with a more exact and efficient way to investigate advanced attacks, SANS Institute today announced a complete …
CISOs anxious about possible data breaches, employees not so much
If you are a Chief Information Security Officer, chances are you may not be getting much sleep lately according to a recent survey of IT security executives at companies of …
Stanford professor scrutinizes India’s biometric identification program
The cutting edge of biometric identification — using fingerprints or eye scans to confirm a person’s identity — isn’t at the FBI or the Department of Homeland …
Sales drop as corporate data breaches rise
Consumers avoid doing business with a breached organization at an alarming rate, according to a new study commissioned by Identity Finder, the results of which were revealed …
ManageEngine fortifies enterprise security log analytics
ManageEngine announced the general availability of new features to its enterprise security log analytics portfolio. EventLog Analyzer, the security information and event …
IT sec pros surprisingly cavalier about mobile security best practices
A flash poll conducted at Infosecurity Europe 2014 by Centrify Corporation has found that 94 per cent of IT security professionals use third party applications on their mobile …
IoT security requirements will reshape enterprise IT security programs
The power of objects in the Internet of Things (IoT) to change the state of environments — in addition to generating information — will cause chief information security …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations