Help Net Security
Insider threat: Users are out of control
Employees are granted excessive privileges and access for their particular roles resulting in unnecessary risks to organizations. One of the most startling statistics from a …
Microsoft releases Sigcheck 2.0
Sigcheck is a command-line utility that shows file version number, timestamp information, and digital signature details, including certificate chains. Version 2.0 adds …
Secure file sharing for Mac with native OS X integration
Infrascale released FileLocker for Mac, with native OS X integration. OS X users now have direct access to File Locker’s Ultrasafe features as well as Private Cloud …
Security now the top issue for network managers
Security returns to the top of the list of network manager ‘pain points.’ Conducted earlier in 2013, TheInfoPro study identifies key initiatives of senior …
DARPA announces cyber defense tournament with a $2 million cash prize
What if computers had a “check engine” light that could indicate new, novel security problems? What if computers could go one step further and heal security …
What has changed in ISO 27001?
Learn what has changed in ISO 27001 using this easy to understand infographic, click the image to get the complete version: The key differences are detailed including: Most …
Most young adults not interested in a cybersecurity career
While U.S. government officials find the current pipeline for cybersecurity talent to be lacking, 82 percent of U.S. millennials say no high school teacher or guidance …
Cyber attacks targeting the energy sector on the rise
Alert Logic examined the rise of cyber attacks targeting the energy sector—an industry thought to be particularly at risk due to the highly confidential and proprietary …
Young employees don’t care about corporate policies
There’s a growing appetite of Generation Y employees to contravene corporate policies governing use of own devices, personal cloud storage accounts and new technologies …
Free eBook: OpenSSL Cookbook
If your job has something to do with security, web development, or system administration, you can’t avoid having to deal with OpenSSL on at least some level. This book …
IBM unveils new cloud solution
IBM announced a new cloud solution that combines software analytics and cloud security services to fend off web-based DDoS attacks for organizations doing business on the web …
Attackers use smaller botnets to launch high-bandwidth attacks
DDoS perpetrators changed tactics in Q3 2013 to boost attack sizes and hide their identities, according to Prolexic. “This quarter, the major concern is that reflection …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool