Help Net Security
Key security program and budget data for CISOs
Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …
The biggest challenge to IT security is marketing
Most companies today are using social media and online marketing channels to tell their customers and prospects about what they do. From company Twitter accounts, LinkedIn …
An introduction to firmware analysis
This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an …
Week in review: Target breach expands, the security realities of the Internet of Things
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: How to make malware warnings more effective? An effective security …
Personal info of 70 million Target customers compromised
Target today announced updates on its continuing investigation into the recent data breach. As part of Target’s ongoing forensic investigation, it has been determined …
Fear of data sharing on the rise
U.S. consumer attitudes and behavior related both to data sharing and social media oversharing have shifted significantly just within the last two years, according to a new …
The basics of digital wireless communication
The aim of this talk by Clemens Hopfer from the 30th Chaos Communication Congress is to give an understandable insight into wireless communication, using existing systems as …
Barracuda Networks unveils Backup-as-a-Service
Barracuda Networks announced its new Backup-as-a-Service (BaaS) offering, which allows Barracuda Backup 190 and 390 to be purchased as an annual service that includes an …
Light Patch Tuesday coming up
2014 is getting off to a light start with Microsoft. Only four advisories in the January advance notification. For the first time in a while, there is not a cumulative IE roll …
Key trends for identity and access management
CA Technologies announced its predictions in identity and access management (IAM) and their impact on security professionals in 2014. “We believe that the technology …
What healthcare security and privacy pros wish for
2013 proved to be a dizzying year for healthcare compliance, privacy, and information security: the Affordable Care Act, enforcement of the HIPAA Omnibus Final Rule, and …
The security realities of the Internet of Things
SANS announced results of its 2013 Securing the Internet of Things survey, in which 391 IT professionals answered questions about the current and future security realities of …