Help Net Security
How to protect your identity this tax season
The majority of taxpayers will prioritize protecting their personal information this tax season, yet some safeguards go underused, according to Experian. Taxpayers are filing …
How a penetration test helps you meet PCI compliance guidelines
In order to protect credit card data, sometimes businesses have to think like a hacker. Every year, merchants who transmit, process, or store payment card data must conduct a …
The app economy demands a new security approach
Protection is still the main driver for security, but a new CA study reveals that organizations understand the application economy demands a new view and approach to security. …
What infosec can learn from the Greek elections
Sometimes disruption just happens. It occurs when something creates a dramatic change of direction, and examples are all around us: the introduction of the GUI, the iPod and …
Security outlook: Technologies and key trends
Anonymous threats and lone wolf attacks, increasing fears on cyber security and concerns over immigration will generate significant debate over foreign policy and how to …
Overcoming the daily challenges of a security team
The constantly evolving cyber threat landscape is resulting in new challenges and approaches for today’s security analyst teams. In the past, companies looked at the …
Do government initiatives increase security awareness?
New research, by SecureData and Vanson Bourne, investigated the impact government security initiatives had on end-user organizations in 2014, with nearly half (47%) reporting …
Week in review: How GitHub is redefining software development, Glibc bug, drone-hijacking malware
Here’s an overview of some of last week’s most interesting news, interviews and articles: VPN services blocked by China’s Great Firewall A number of popular …
Nearly half of all DDoS attacks use multiple attack vectors
Akamai released a new security report that provides analysis and insight into the global attack threat landscape including DDoS attacks. Akamai observed a 52 percent increase …
How to determine if insiders should be your primary concern
We learned throughout our lives that if we experience the same problem over and over again in a certain situation, we should probably change something in our own behavior / …
How people perceive online privacy
A new study by the National Cyber Security Alliance shows that Americans care deeply about their privacy. While a great knowledge gap exists about how information is collected …
What IT workplace issues keep CIOs awake at night?
What worries chief information officers (CIOs) and IT professionals the most? According to a recent survey by Sungard AS, downtime and talent acquisition weigh heaviest on …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations