Help Net Security
A hybrid approach to web app security assessment
High-Tech Bridge is introducing its hybrid web application security assessment SaaS, ImmuniWeb for the first time ever to visitors at Infosecurity Europe 2014. The service, …
99 percent of Q1 mobile threats targeted Android
Over 99% of new mobile threats discovered by F-Secure Labs in the first quarter of 2014 targeted Android users, according to the company’s new Mobile Threat Report. 277 …
Only 1% of Q1 data breaches were “secure breaches”
Of the 254 data breaches that occurred during the first quarter of 2014, only 1 percent were “secure breaches,” i.e. breaches where strong encryption, key …
Defacement mitigator for cybersecurity protection
At Infosecurity Europe 2014, Foresight released Defacement Mitigator, the first cloud-based web security solution that provides full defacement mitigation and protection to …
A walk through the Infosecurity Europe 2014 expo floor
The conference is underway at Earl’s Court in London, and the expo floor has drawn quite a crowd. Here’s a look at some interesting booths. For up-to-date …
Cyber intelligence services reveal sensitive data firms are leaking online
Cyber intelligence company Digital Shadows has launched SearchLight – a suite of managed cyber intelligence services designed to reveal sensitive data companies are …
Spike in DDoS attack size driven by NTP misuse
The beginning of 2014 saw 1.5 times the number of attacks over 20GB/sec, compared to the rest of 2013, according to new stats released by Arbor Networks today. At the …
Widespread uncertainty about cloud security
More and more organizations are transferring sensitive or confidential information to public cloud services even though more than a third expect a negative impact on security …
Data encryption for secure communications
IGUANA Security launched the latest addition to its family of Critical National Infrastructure (CNI) solutions at Infosecurity Europe 2014. IGUANAGreen is a commercial …
CoSoSys updates Endpoint Protector 4
At Infosecurity Europe 2014 in London today, CoSoSys updated the Endpoint Protector 4 platform, which provides IT administrators with improved Content Aware Protection …
Key security technologies can help cloud adoption
The majority of companies are delaying deployment of cloud applications due to security and compliance concerns. Among the companies that have started to adopt cloud apps …
How to learn information security
Learning is a skill. A skill that can be, well, learned. I am often approached by young people who ask me what does it take to move into the information security field, what …