Help Net Security
Tips for utilities to comply with new cybersecurity standards
When the North American Electric Reliability Corporation (NERC) signed Order 791 in January 2014, more than 400 utilities suddenly faced a tight timetable to plan for and …
Global cost of data breach goes up by 15 percent
The average consolidated total cost of a data breach increased 15 percent in the last year to $3.5 million, say the results of Ponemon Institute’s ninth annual Cost of …
Mobile phone security transformed with 4 new encryption apps
Following the high profile breaches of mobile phone security that have hit the headlines in recent years, a British company has launched a new range of mobile phone apps that …
NIST updates Transport Layer Security (TLS) guidelines
The National Institute of Standards and Technology (NIST) has released an update to a document that helps computer administrators maintain the security of information …
Week in review: IE 0-day patched, Windows XP gets unexpected update, and tips on how to learn information security
Here’s an overview of some of last week’s most interesting news, reviews and articles: XSS bug in popular Chinese site exploited to launch DDoS attack DDoS …
Red Hat to acquire open source storage systems’ firm Inktank
Red Hat announced that it has signed a definitive agreement to acquire Inktank, a provider of scale-out, open source storage systems. Inktank’s flagship technology, …
SANS revamps its Memory Analysis Course
To provide digital forensic and incident response professionals with a more exact and efficient way to investigate advanced attacks, SANS Institute today announced a complete …
CISOs anxious about possible data breaches, employees not so much
If you are a Chief Information Security Officer, chances are you may not be getting much sleep lately according to a recent survey of IT security executives at companies of …
Stanford professor scrutinizes India’s biometric identification program
The cutting edge of biometric identification — using fingerprints or eye scans to confirm a person’s identity — isn’t at the FBI or the Department of Homeland …
Sales drop as corporate data breaches rise
Consumers avoid doing business with a breached organization at an alarming rate, according to a new study commissioned by Identity Finder, the results of which were revealed …
ManageEngine fortifies enterprise security log analytics
ManageEngine announced the general availability of new features to its enterprise security log analytics portfolio. EventLog Analyzer, the security information and event …
IT sec pros surprisingly cavalier about mobile security best practices
A flash poll conducted at Infosecurity Europe 2014 by Centrify Corporation has found that 94 per cent of IT security professionals use third party applications on their mobile …
Featured news
Resources
Don't miss
- The $19.5 million insider risk problem
- Open-source security debt grows across commercial software
- Review: Digital Forensics, Investigation, and Response, 5th Edition
- AI-driven DAST reduces manual setup and surfaces exploitable vulnerabilities
- Hottest cybersecurity open-source tools of the month: February 2026