How to conduct an internal audit according to ISO 27001 and BS 25999-2
The key purpose of an internal audit is for an organization to find out if all the processes and activities are running as they are expected. An nternal audit is usually …
WineHQ database breached; Fedora Project forces password change
Following last month’s compromises of the primary repository for the Linux kernel source code and the websites and infrastructure of the Linux Foundation comes the news …
Data security for businesses that don’t need a full security suite
Protecting sensitive data is an irreplaceable part of computer security. Useful tools for data encryption and shredding belong to the standard gear of TrustPort Total …
Trojanized Netflix app steals account login credentials
When Netflix released an Android client app earlier this year, it also witnessed the attempts of various app developers who tried to make a pirated copy of it work on other …
Security pros say that hackers have the upper hand
The numbers don’t lie: now, more than ever, security professionals feel outgunned by attackers and the level of automation employed in most campaigns against enterprise …
Cyber threat defense, detection and response platform
LogRhythm announced LogRhythm 6.0, an evolution to its SIEM 2.0 security intelligence platform with significant innovations in cyber threat defense, detection and response. …
Website reputation and automatic blacklisting enhance GFI WebMonitor
GFI announced that GFI WebMonitor now includes new security and anti-malware features that enable small and medium-sized businesses to provide employee Internet access without …
Verisign asks for ability to suspend domains without a court order
Verisign, the operator for all .com, .net, and .name top-level domain, has submitted a request to ICANN asking for the power of taking down “abusive” domains …
40% of SMBs suffered breach due to unsafe Web surfing
40 percent of small and medium-sized businesses have suffered a security breach due to unsafe web surfing, and nearly one-third still do not have a policy to govern the use of …
Network security platform for multiple X-Series deployments
Crossbeam announced that it has expanded its family of X-Series network security platforms with the X50, a new platform that enables larger IT organizations with multiple …
90,000 accounts compromised in new Sony attack
60,000 PlayStation Network and Sony Entertainment Network accounts and 33,000 Sony Online Entertainment accounts have been compromised during what Sony describes as a testing …
Photos: The look and feel of RSA Conference Europe 2011
Help Net Security is attending RSA Conference Europe 2011 in London this week. Here’s an overview of the event in photos. Art Coviello, Executive Vice President, EMC …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online