Help Net Security
Latest leaks by NSA whistleblower reveal NSA’s global reach
EU countries might be formally outraged at the US bugging of EU officials both in America and Europe and NSA’s phone surveillance in general, but as news outlets …
Identity and access management tips for proactive compliance
N8 Identity announced eight tips for proactive compliance through identity and access management (IAM) best practices. These tips offer advice to organizations seeking to …
Equifax acquires TrustedID
Equifax has acquired TrustedID, which will become part of Equifax Personal Solutions, Equifax’s direct-to-consumer business unit offering credit monitoring and identity …
Selecting a cloud provider starts with exit planning
Let’s begin with a story: The first day of the new week started very ordinarily and nothing indicated this was going to be a very long and tiring day for Sarah, a CIO of …
Audit privileged access to Microsoft Online Services
Xceedium announced Xsuite will include protection for Office 365, Exchange, Lync, and SharePoint. The additional protection for Microsoft online services complements …
US Emergency Alerting System vulnerable to attack
IOActive has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States. They uncovered the …
Super-scalable LDAP directory driven by big data
Radiant Logic announced a commercial solution for distributed storage and processing for enterprise identity management. Based on Hadoop, this new highly-available version of …
Global security threats focus of Technology Against Crime Forum
Senior representatives from governments, law enforcement, industry, security and academia from around the world are gathering in Lyon for the first Technology Against Crime …
Workers do not trust employers with personal data
Workers using their own mobile devices for work remain fearful of their employer accessing their personal information. A new Aruba Networks report features a study of over …
London Olympics cyber attack fears
The BBC has released details from 2012 Olympic Games officials about fears that the opening ceremony might have come under cyber-attack. Here are some comments from industry …
EMC acquires Aveksa
EMC has acquired privately held Aveksa, which will operate within the RSA security division as part of RSA’s Identity Trust Management product group, bringing leading …
Dissecting operation Troy: Cyberespionage in South Korea
When reports of the Dark Seoul attack on South Korean financial services and media firms emerged in the wake of the attack on March 20, 2013, most of the focus was on the …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems