Help Net Security
Security policy management in hybrid cloud environments
A new survey by AlgoSec found that 79 percent of organizations need better visibility in order to unify security policy management across their on-premise and public cloud …
The Crime-as-a-Service business model
A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals. This …
Seagate Surveillance HDD features recovery services
Seagate released a dedicated surveillance HDD featuring Seagate Rescue services. Engineered specifically for surveillance and video analytics applications, the Surveillance …
CloudFlare offers free SSL encryption
Web performance and security company CloudFlare today launched Universal SSL, making Secure Socket Layer (SSL) encryption available to anyone at no cost. “Yesterday …
Education is the key to increasing mobile security
The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …
Trust in the cloud is at an all-time low
Data security and trust in cloud-based services are a rapidly growing concern for IT decision makers within large organizations, according to a new global study from BT. While …
Week in review: Bash Shellshock bug, jQuery.com compromise, and a replacement for TrueCrypt
Here’s an overview of some of last week’s most interesting news and articles: Behavioral analysis and information security In this interview, Kevin Watkins, Chief …
Malvertising attack techniques dissected
At Virus Bulletin 2014, Bromium presented a research report that highlights the severe risk of malicious ad networks infecting end users. This research provides a real-world …
Making one organization’s incident everyone’s defense
The Financial Services Information Sharing and Analysis Center (FS-ISAC), an organization focused on sharing critical cyber security threat information worldwide, and The …
Phishers go after unprecedented breadth of targets
Apple is the most phished brand in the world, accounting for 17 percent of all phishing reports sampled and analyzed from the first half of 2014, say the results of the new …
Consumers increasingly blame companies for data breaches
Moving forward, every company involved in a major data breach—those actually attacked, such as retailers Home Depot, Target, Goodwill and Neiman Marcus, as well as banks, …
Five of the biggest data myths debunked
With so much hype about big data, it’s hard for IT leaders to know how to exploit its potential. Gartner dispels five myths to help IT leaders evolve their information …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services