Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
The growing hacking threat to e-commerce websites, part 2

In the first part of my article, I briefly revised attackers’ motivations to compromise your website. In this part, I will discuss how websites get hacked, how you can …

BYOD and biometrics in the enterprise – ally or enemy?

BYOD continues its victory march as the enabler of choice among employees juggling increasingly intertwined home and work lives – for IT managers however it is the stuff …

Four reasons why audits matter

We live in a world where assurance is a precious commodity. People with bad intentions are getting smarter every day as evidenced by the recent compromise of nearly 40 million …

How have consumer attitudes changed towards data security?

Over the last few years, data has become non-exclusive; with the information consumers create and leave behind now the stuff of headlines and documentaries. From swiping a …

Breaking the backlog of digital forensic evidence

It is time for a change in the way the law enforcement works with digital forensic evidence. Every police investigator needs to be able to quickly and easily analyze digital …

Lessons learned in password security 2013

As 2013 comes to a close, it’s time to reflect on a year of change for password security and the implications for the year ahead. Large scale security breaches this year …

What are the building blocks of security culture?

In order to understand how to create security culture, it is important to know what it is and how we define it, so that we can look beyond the basics. Taking into …

Teaching children information security skills

In this interview, Julie Peeler, the Director of the (ISC)2 Foundation, discusses the biggest online threats to kids and provides tips on how to teach children to stay safe …

The growing hacking threat to e-commerce websites, part 1

Recently, a friend of mine, owner of a small online web store, had his website compromised. He asked me lots of questions about why this had happen (he didn’t really …

Configuring for security in a world of 0-days

Last month, Microsoft published two separate notices of 0-day vulnerabilities that were being used in the wild to attack Microsoft products. The first flaw is in a code …

Using firewall rules to migrate business applications to a private cloud

An increasing number of organizations are already taking advantage or planning to take advantage of the many financial and operational benefits that a private cloud has to …

The DDoS debate: Multi-layered versus single solution

There is a DDoS debate in the cybersecurity industry about which solution is more effective – multi-layer or single. However, the argument is really more complex and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools