Help Net Security

Attackers will target U.S. power systems
A hack on the Ukrainian power grid in late 2015 “blacked out more than 225,000 people,” according to Claims Journal, which described this type of attack as a …

UK businesses fail at security awareness
UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and …

Password sharing habits prioritize convenience over security
A new survey by LastPass on the password sharing habits of UK consumers reveals they favour convenience over security when it comes to sharing passwords. 55 per cent of UK …

My reflections after visiting RSA Conference 2016
RSA Conference has long been the place where security vendors announce new products and services, and industry trends are made. I was told by Centrify that recent breaches …

BorgBackup: Deduplication with compression and authenticated encryption
BorgBackup is a deduplicating backup program that supports compression and authenticated encryption. The main goal of BorgBackup is to provide an efficient and secure way to …

Week in review: DROWN attack breaks TLS encryption, hijacking police drones, RSA Conference 2016 coverage
Here’s an overview of some of last week’s most interesting news, reviews and articles: RSA Conference 2016 coverage Check out our coverage page to see what …

Photo gallery: RSA Conference 2016 Expo
RSA Conference 2016 ends today, and as a wrap up, here are a few more photos from the Expo floor. Featured companies: Niara, SecureAuth, Qualys, Tenable, Auconet, FireEye, Algosec.

How effective are orgs at detecting and investigating cyber threats?
A new threat detection effectiveness survey compiling responses from more than 160 respondents around the world has provided valuable global insight into what technologies …

WinMagic provides encryption of virtual machines running on IaaS platforms
At RSA Conference 2016 WinMagic introduced security software that encrypts virtual machines running on Infrastructure as a Service (IaaS) platforms. Addressing the growing …

Real-time detection and automatic containment of Active Directory attacks
CyberArk announced at RSA Conference new real-time threat detection and containment capabilities to help organizations secure against cyber attacks targeting Microsoft Active …

Bank password policies are often substandard, study finds
A study of 17 major US banks shows that six of them have weak password handling and that their password procedures are weaker than most social websites. The six banks, 35 …

Cybersecurity still seen as a tech issue, not a business imperative
Cybersecurity is now front and center on organizations’ boardroom agendas, but most chief information security officers (CISOs) have yet to earn a seat at the table. According …
Featured news
Resources
Don't miss
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days