Help Net Security
52% of enterprises defenseless against cyber attacks
55 % of IT and security professionals have either zero or low visibility of employee behavior, application access and software downloads as they struggle to secure the …
Security still the biggest concern for cloud adoption
IT companies say tighter security tops the list of their clients’ concerns, rating even more important than mobile-device management, support for the cloud and data …
Week in review: OpenSSL Heartbleed bug, Windows XP reaches end of line
Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: Does IP convergence open you up to hackers? Recent reports …
Vendors address the Heartbleed bug
Which products and services are affected by the Heartbleed bug in OpenSSL? Vendors have started issuing security advisories telling users which of their products are safe and …
Advanced attackers go undetected for 229 days
A new FireEye report details the tactics used by threat actors to compromise organizations and steal data. It also highlights emerging global threat actors, their suspected …
Most cloud services are putting businesses at risk
A new Skyhigh Networks report analyzes usage data from more than one million users across more than 40 companies spanning the financial services, healthcare, high technology, …
The state of remote access security
At the end of 2013, HOB conducted a survey of more than 200 CIOs and CTOs in the U.S. The survey quantified the trends and challenges IT decision makers experience when …
The digital universe will reach 44 trillion gigabytes by 2020
A new EMC study reveals how the emergence of wireless technologies, smart products and software-defined businesses are playing a central role in catapulting the volume of the …
Universities now have access to cybersecurity education
(ISC)2 is making its educational resources, which are updated regularly by its members and industry luminaries, available to academia to help meet the global demand for more …
Breaches expose 552 million identities in 2013
After lurking in the shadows for the first ten months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history. Symantec’s Internet Security …
TCG releases TPM 2.0 specification for device security
The Trusted Computing Group (TCG) has announced the TPM (Trusted Platform Module) 2.0 library specification, which provides a technology response to the global need for a more …
Lie detection technology that accurately reads eye behavior
A company has discovered how to not just open the window to the soul via one’s eyes, but also accurately determine whether or not that soul is lying. For years, …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security