Help Net Security
                                Why the next wave of cybersecurity talent won’t have a ‘security’ job title
Over the past five years, we’ve witnessed the state of cybersecurity become chaotic – and, quite frankly, grim – across a variety of industries. Hotels, financial …
                                Security concerns over connected devices mask the greater threat
The popular and sometimes controversial Shodan search engine made some changes recently that drew attention mostly of the latter variety. If you are not familiar with Shodan, …
                                Google Hands Free entering the mobile payments game
Google has announced that it is testing its new payment app, Hands Free, which (as the name suggests) allows users to make payments without the need to use their hands, mobile …
                                Cloud Status: Free app for cloud infrastructure monitoring
Server Density released a new free iOS app that enables you to stay up to date with the service status from key cloud providers. The Cloud Status app sends you notifications …
                                It’s time to kill the static password
How do you manage your passwords? Do you set them all to approximately the same value, for fear of forgetting them? Or do you write them down in a little book, or in a …
                                A rogue access point at RSA Conference? Here’s what happened
Ever since businesses began to offer Wi-Fi access to customers, experts have warned that open hotspots are not secure. Open Wi-Fi hotspots don’t ask a user for a …
                                Security concerns limit business initiatives
Though the C-suite recognizes the benefits of data security, organizations are still struggling to develop programs that effectively incorporate security strategies without …
                                Week in review: First OS X ransomware, hacking Internet-connected trucks, CVE system problems
Here’s an overview of some of last week’s most interesting news, reviews, podcasts and articles: OS X ransomware found bundled with legitimate software Palo Alto …
                                Corruption: The magnitude of risk
40 percent of all compliance officers surveyed believe their company’s bribery and corruption risks will increase in 2016, according to a new report by Kroll and the …
                                Microfluidic cooling turns down the heat on high-tech equipment
Thousands of electrical components make up today’s most sophisticated systems – and without innovative cooling techniques, those systems get hot. Lockheed Martin is …
                                Has your network been compromised? Use RITA to find out
Have you heard about RITA? Real Intelligence Threat Analysis is a an open source tool – a framework, actually – aimed at helping organizations find malicious …
                                Biometric tech uses sound to distinguish ear cavity shape
NEC is developing a new biometric personal identification technology that uses the resonation of sound determined by the shape of human ear cavities to distinguish …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down