Help Net Security
Dependability through Assuredness Standard released
The Open Group announces the publication of the Dependability through Assuredness Standard (O-DA), which will benefit organizations relying on complex systems to avoid or …
Cloud contracts need transparency to improve risk management
Buyers of commercial cloud services, especially software as a service (SaaS), are finding security provisions inadequate. Gartner, Inc. said SaaS contracts often have …
Top destinations for cyber security pros
Semper Secure announced the results of its Cyber Security Census. Based on a survey of 500 cyber security professionals from 40 different industries across 43 states, the …
Attackers are taking advantage of old vulnerabilities
FortiGuard Labs observed a 30 percent increase in mobile malware in the labs over the last six months. The team is now seeing more than 1,300 new samples per day, is currently …
Enterprises in denial regarding network security
Many enterprises possess an unrealistic confidence surrounding the security of their networks. According to a Lancope survey, more than 65 percent of IT/security professionals …
Free ebook: Introducing Windows Server 2012 R2 Preview Release
Microsoft released a free ebook by Mitch Tulloch with the Windows Server Team. Introducing Windows Server 2012 R2 Preview Release introduces new features and capabilities, …
Cybercriminals are doing a better job than the companies they target
What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney’s Office in NJ unsealed their …
Russians responsible for 30% of mobile malware
Lookout investigated 10 Russian-based organizations, uncovering that the mobile malware industry in Russia has become organized and profitable. These malware businesses …
Collaborative threat intelligence platform from ThreatConnect
ThreatConnect launched the ThreatConnect Platform, a combination of analytical tools that assist in finding and analyzing threat indicators and community-based sharing …
Week in review: iPhone charger, PLC, femtocells hacks, and the future of phishing
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: To achieve good security, you need to focus on business In September …
CISO spending priorities revealed
According to a GDS International survey of more than 100 leading European information security professionals, investment priorities are changing. Spending to support business …
How to avoid digital dangers while traveling
It’s summer holiday season, when people pack up their smartphones and tablets, sunscreen and tank tops and set off for a change of pace. With connected devices …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems