Help Net Security
Week in review: eBay breach, Linux Trojans, US charges Chinese military hackers for spying on US firms
Here’s an overview of some of last week’s most interesting news, podcasts, and articles: Record month for Linux Trojans If you think that you are protected from …
Netwrix extends auditing visibility into SharePoint changes
SharePoint has become a popular business application for storing data, sharing content and powering websites. For many organizations, it is the core of their collaboration …
DDoS attacks: Criminals get stealthier
There is a lot of media hype surrounding volumetric style DDoS attacks recently where the focus has been on large Gb/sec attacks, sometimes up to 400 Gb/sec. In reality, these …
What is the key to IT program management?
The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, inc. …
Trust in the U.S. cloud on the decline
Perspecsys revealed a continental cloud divide between the U.S. and Europe, based on data findings from a study it conducted at Infosecurity Europe 2014. Perspecsys surveyed …
POS facial recognition can prevent fraud
Lately, the news has been filled with stories of identify fraud. This, paired with the increase in mobile payments, furthers the need for companies to have access to enhanced …
Mobile app for single sign-on access to thousands of applications
Ping Identity announced a native mobile application that delivers single sign-on (SSO) access to thousands of applications from any device. Available for iOS and Android, the …
What are the biggest risks with the Internet of Things?
The majority of small businesses in the U.S. (82 percent) believe the Internet of Things (IoT) will bring fresh opportunities for their business, according to a new study …
Reactions to the eBay breach
A database containing eBay customers’ name, encrypted password, email address, physical address, phone number and date of birth was compromised. Here are some of the …
More enterprises to adopt multi-factor authentication
Rising security risks, and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions. A new SafeNet survey …
Hybrid cloud computing success factors
In the past three years, private cloud computing has moved from an aspiration to a tentative reality for nearly half of the world’s large organizations. Hybrid cloud …
Company and employee disconnect on BYOD security policies
Many employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns, according to Webroot. Key findings: …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC