Help Net Security
A guide to cloud encryption and tokenization
Cloud adoption shows every sign of continuing to grow. The sharing of resources helps businesses achieve savings and agility based on economies of scale but there’s a …
How can we create a culture of secure behavior?
It’s a busy day in your company and everyone is rushing around trying to respond to requests. Audrey gets an email that looks like it’s from a partner asking her …
Insights from attack trends in the cloud
Drawing on data obtained from a customer base of 2,200, Alert Logic found a significant increase in activity across cloud and hosting environments compared to last …
Free Heartbleed scanner for Chrome and Android
To help Internet users protect themselves from the Heartbleed bug that is eroding SSL security features on websites worldwide, Trend Micro released two free Heartbleed …
CyberRX: Healthcare industry’s first cyber attack simulation
HITRUST, in coordination with the U.S. Department of Health and Human Services (DHHS), revealed the results of the healthcare industry’s first cyber attack simulation, …
Week in review: SATCOM (in)security, Heartbleed fallout, and the security of programming languages
Here’s an overview of some of last week’s most interesting news and articles: Appeals court overturns AT&T hacker’s sentence Andrew “weev” …
Cross Match acquires DigitalPersona
Cross Match Holdings and DigitalPersona announced a merger agreement that will combine the two companies. With more than 300 employees, a network of partners and millions of …
Organizations remain vulnerable to SQL injection attacks
Privacy and information security research firm Ponemon Institute, along with DB Networks, an innovator of behavioral analysis in database security, today announced the results …
Understanding risk is a top security concern
The biggest challenge for organizations is prioritizing, understanding and addressing vulnerabilities in a business context, according to an AlgoSec survey conducted during …
Compliance is no guarantee of security
The regulatory landscape is constantly evolving. For example tougher new EU data protection laws are scheduled to come into effect over the next year or two. These new …
Security pros largely unhappy with compliance methods
Despite the fact that 63% consider regulatory compliance to be “very important”, a new Osterman study shows a low satisfaction level with current methods of …
ESET launches secure authentication SDK
ESET launched the ESET Secure Authentication Software Development Kit (SDK). With this release, ESET provides system architects with a comprehensive developer guide in three …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations