Help Net Security
Vigilance and the Enterprise of Things
Most enterprises allow BYOD in their environment, with varying levels of supervision. Typically, these are tablets and smartphones but the number of other Internet of Things …
A holistic approach to protecting intellectual property
Protecting intellectual property (IP) is high priority for security professionals, but IP can be a vague term. What exactly is included under the umbrella of IP? And …
Darkhotel espionage campaign targets corporate executives traveling abroad
Kaspersky Lab researched the Darkhotel espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate …
Aligning risk analysis and IT security spending
IT security spending should be aligned with risk analysis results. Too frequently, though, this is not the case. Thought leaders in information security have been describing a …
Internet of Things to reach 30 billion devices in 2020
While most everyone agrees that the Internet of Things (IoT) is poised for explosive growth and represents boundless opportunities – billions of connected things driving …
Week in review: Unprecedented iOS, OS X malware, secure messaging tech, Silk Road 2 takedown
Here’s an overview of some of last week’s most interesting news, reviews and articles: Researchers audit the TextSecure encrypted messaging app A group of German …
Overcoming Big Data security obstacles
When it comes to security, Big Data can be the cause of many obstacles. As Big Data often contains enormous quantities of personally identifiable information, privacy becomes …
Silk Road 2.0 shut down, operator arrested, charged
The United States Attorney for the Southern District of New York has announced today the arrest of Blake Benthall, a.k.a. “Defcon,” in connection with his …
Enterprises must prepare for attacks on supply chain and POS in 2015
One thing is certain – there is plenty of job security in the business of protecting data. Attackers keep upping their game therefore, so must we. 2014 can be …
One in three Americans don’t use basic malware protection
One in three US-based computer users don’t use an antivirus solution, according to a survey carried by Bitdefender in September. Only 67.3 percent of respondents are …
Cisco projects data center traffic will nearly triple
In the fourth annual Cisco Global Cloud Index, Cisco forecasts continued strong growth of cloud traffic, cloud workloads and cloud storage with private cloud significantly …
INTERPOL World 2015 expects high-level international participation
More than 70 percent of the exhibition space for INTERPOL World, a new international security event taking place from 14-16 April 2015 in Singapore, has been booked by key …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits