Help Net Security
Why break in, if you can simply login?
I was asked the other day why so many security breaches are hitting the headlines and are seemingly getting larger and more frequent. The game of cyber security has changed …
Zero Trust approach to network security
Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.With Zero Trust there …
86.2 million phone scam calls delivered each month in the U.S.
Phone fraud continues to threaten enterprises across industries and borders, with the leading financial institutions’ call centers exposed to more than $9 million to potential …
Emulating the security analyst with software
This is the second installation of a two-part article discussing why static security detection methods can no longer protect enterprises from advanced hacking efforts. In this …
Exposing cyberattacks targeting government networks in Southeast Asia
Palo Alto Networks uncovered a series of potentially state-sponsored cyberattacks targeting government and military organizations in countries throughout Southeast Asia. Help …
Risks from fraudulent mobile apps and unauthorized app stores
Companies spanning retailers, travel companies, media & entertainment, gambling firms and banks have far more mobile apps owned by them or referencing their brand than …
Reactions to the LastPass breach
LastPass, the company behind the popular password management service of the same name, has announced that they have suffered a breach, and has urged users to verify their …
How trustworthy are the world’s leading websites?
The Online Trust Alliance (OTA) evaluated nearly 1,000 websites, grading them based on dozens of criteria in three categories: consumer protection, privacy and security.Their …
A call to researchers: Mix some creation with your destruction
Since I can first remember being interested in information security, my personal hacker heroes (and I’m using hacker positively here) were the researchers who discovered zero …
90% of companies benefit from Big Data
Enterprise Big Data strategies are delivering key benefits to organizations despite noted challenges in implementation, according to CA Technologies.Nine in 10 organizations …
Stronger data protection rules for Europe
More than 90% of Europeans are concerned about mobile apps collecting their data without their consent. Today, an important step was taken to finalize EU data protection rules …
Does the UK need to do more to address the threat of nuclear terrorism?
The emotive nature of linking nuclear and terrorism in the same sentence leads to understandably visceral responses as we all seek to protect ourselves and our loved ones from …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform