Help Net Security
What CIOs can expect in 2014
While the 3rd platform of mobile, social, big data, and cloud services is just beginning to mature, it will require an entirely different set of IT skills and roles — many of …
CSA details Software Defined Perimeter Framework
The Cloud Security Alliance (CSA) announced the release of the Software Defined Perimeter Report, a new white paper report that explains the Software Defined Perimeter (SDP) …
The state of targeted attacks
Trusteer announced the results of a recent study on the State of Targeted Attacks, which took into consideration the feedback from over 750 IT and IT security practitioners …
New ICS cyber security cert
Global Information Assurance Certification (GIAC), a leading provider of cyber security certifications and an affiliate of the SANS Institute, announced the release of the new …
Microsoft and law enforcement disrupt ZeroAccess botnet
The Microsoft Digital Crimes Unit announced it has successfully disrupted a rampant botnet in collaboration with Europol’s European Cybercrime Centre (EC3), the Federal …
International payment card fraud ring dismantled
The European Cybercrime Centre (EC3) at Europol, working with police in Latvia, Estonia, Poland, Bulgaria, Spain, Lithuania, Norway, Sweden and the United Kingdom, have taken …
Cisco updates CCIE routing and switching certification
Cisco announced a major revision of the CCIE Routing and Switching (R&S) Certification and expert-level training to meet the increasing challenges of enterprise networks …
Top 20 Critical Security Controls not popular with federal IT pros
The National Security Agency created a best security practices list for their customers, which was later expanded through a large-scale community project initiated by the SANS …
Browser hygiene tips for making online shopping safer
The fuller schedules and longer to-do lists of the holiday season often mean multi-tasking and stress. And busy, distracted people doing their holiday shopping online may be …
CIOs lack the vision when it comes to mobility
Mobile Helix announced the findings of an independent CIO survey of 300 IT decision makers in the UK and US; exploring how enterprises are making use of mobile technology. The …
Financial services cyber security trends for 2014
Five years ago, questions directed at boards of directors and senior executives at financial services firms on the toughest risk management issues might have resulted in …
ENISA provides new guide for mitigating ICS attacks
The EU’s cyber security agency ENISA has provided a new manual for better mitigating attacks on Industrial Control Systems (ICS), supporting vital industrial processes …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)