Help Net Security
Native Hadoop security tools are not enough
While an overwhelming majority of Hadoop users agree that data security is a critical requirement, most disagree or are not sure that its native security tools provide enough …
The need for information security innovation
The increasing number of connected devices is multiplying the probability of cyberattacks on companies across sectors. This is compelling organizations to adopt cybersecurity …
SSL Labs unveils free open source tool, new APIs
Qualys SSL Labs now includes free assessment APIs, accompanied by a free open source tool that can be used for bulk and automated testing of websites. These new enhancements …
A billion data records leaked in 2014
2014 was the year when “designer vulnerabilities” emerged, when breaches and security incidents were being announced so fast that we struggled to keep up, when old …
Do smart machines require ethical programming?
Realizing the potential of smart machines — and ensuring successful outcomes for the businesses that rely on them — will hinge on how trusted smart machines are and how well …
The evolution of vendor risk management in financial institutions
The Financial Services industry has long been recognized as a leader in establishing many of the security and fraud detection practices that have influenced best practices in …
What pokes holes in virtual environments?
While most companies believe virtualization technology is a strategic priority, there are clear risks that need to be addressed. Ixia surveyed more than 430 targeted …
When it comes to cloud apps, companies are left in the dark
More than two-thirds (67 per cent) of organizations admit that unauthorized cloud applications are being implemented without IT’s knowledge or involvement, and …
Microsoft releases EMET 5.2
Microsoft has released version 5.2 of its Enhanced Mitigation Experience Toolkit (EMET), a free utility that can detect and block exploitation techniques that are commonly …
Cutting-edge security research comes to Amsterdam
Held once again at De Beurs van Berlage, HITB2015AMS takes place from the 26-29 May 2015 and runs alongside HITB Haxpo, a 3-day technology expo for hackers, makers, builders …
Online trust is at the breaking point
IT security professionals around the globe believe the system of trust established by cryptographic keys and digital certificates, as well as the security of trillions of …
Week in review: Shadow IT, crypto-ransomware goes after gamers, and the security of smartwatches
Here’s an overview of some of last week’s most interesting news and articles: Hack yourself first: How we can take the fight to the black hats Threats are no …