Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
What to do about social networking in your company

The growing popularity of social networking sites such as Facebook is slowly developing into a massive headache for IT administrators as employees spend time updating their …

Q&A: Malware Trends

Marc Fossi manages research and development for Symantec Security Response where his primary role is executive editor of the Symantec Internet Security Threat Report. The …

Secure start-up for POS

Secure start-up of encryption services in a typical retail POS configuration can be provided by implementing the following (very general) best practices. Each Local Security …

Keeping Virtual Security Real

Remember the first time you drove a car on your own, and you’d get a kick from the sensation of sheer speed? Unfortunately, you also have to learn the mundane stuff like …

Q&A: Government Security and Mobile Devices

Joseph Hagin is the Former Deputy White House Chief of Staff. In that role he had a high-level of concern about hacking and other security concerns related to …

Towards Kerberizing Web Identity and Services

Today authentication and authorization are addressed in an incoherent, and often site-specific, fashion on the Internet and the Web specifically. This situation stems from …

Applied Binary Code Obfuscation

An obfuscated code is the one that is hard (but not impossible) to read and understand. Sometimes corporate developers, programmers and malware coders for security reasons, …

Q&A: RSA Conference 2009

Sandra Toms LaPedis, Area Vice President and General Manager of RSA Conferences, is responsible for global promotion and successful execution, including strategy, brand …

What the Heartland Data Breach Tells Us

The recent data breach at Heartland Payment Systems should make one thing clear: the standards for security around credit card numbers still aren’t good enough. New …

Code Review or WAFs? PCI 6.6

Short answer: both. Compliance with requirement 6.6 of the PCI DSS cites the use of either a web application firewall (WAF) or code review. It’s far more effective to …

Protecting SOA Against Internal Attacks

It is critical to have a good understanding of the data flow in order to select the optimal protection approach at different points in the enterprise. By properly …

Q&A: Current Security Threats

Simon Heron is an Internet Security Analyst at Network Box, a managed security company, where he is responsible for developing the overall business strategy and growth. In …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools