Help Net Security
New book on implementing business continuity according to ISO 22301
“Becoming Resilient: The Definitive Guide to ISO 22301 Implementation” describes the process of implementing business continuity according to ISO 22301, an …
Breaking the backlog of digital forensic evidence
It is time for a change in the way the law enforcement works with digital forensic evidence. Every police investigator needs to be able to quickly and easily analyze digital …
Lessons learned in password security 2013
As 2013 comes to a close, it’s time to reflect on a year of change for password security and the implications for the year ahead. Large scale security breaches this year …
Will 2014 be the year of encryption?
Security experts at Unisys predicted that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data …
Users more worried about hacking than tracking
Internet users are highly concerned about the theft of personal and financial information and believe strongly that the federal government should do more to protect them, …
Netwrix makes password management free to small businesses
Netwrix announced the availability of Netwrix Password Manager as a completely free offering to businesses with up to 100 users. “According to Forrester research, …
What are the building blocks of security culture?
In order to understand how to create security culture, it is important to know what it is and how we define it, so that we can look beyond the basics. Taking into …
90-day spam campaign turns to Santa in December
Ninety days ago a substantial spam campaign focusing on dubious offers and fake prizes began, according to Commtouch. However since December 10, the campaign has been …
Federal agency cloud adoption increases 400%
Tripwire announced the results of a survey on cloud security technology trends in the federal government. The survey evaluated the attitudes of more than 100 federal …
Information security and compliance trends for the new year
Coalfire released its top five cybersecurity predictions for 2014. Rick Dakin, the company’s chief security strategist, consolidated an analysis from over 1,000 audits …
Lead MEP presents preliminary conclusions on NSA inquiry
The European Parliament should consent to a trade deal with the US only if it makes no reference to data protection, says its Civil Liberties Committee in the preliminary …
Five resolutions to help IT pros get ready for 2014
IT and cybersecurity professionals should resolve now to gear up for accelerated change and complexity in 2014, especially in cybersecurity, data privacy and big data, says …
Featured news
Resources
Don't miss
- Prioritizing data and identity security in 2025
- eBook: What does it take to be a full-fledged virtual CISO?
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk