Help Net Security
The dangers of weakening cybersecurity to facilitate surveillance
In response to the controversy over the alleged surveillance practices of the NSA, the White House established the Review Group on Intelligence and Communication Technologies, …
Triumfant detects and stops in-memory malware attacks
Advanced Volatile Threats are malware attacks that take place in a computer’s RAM or other volatile memory, and are difficult to detect because they are never stored to …
New healthcare security and privacy certification from (ISC)2
(ISC)2 has launched a new certification, the HealthCare Information Security and Privacy Practitioner (HCISPPSM), the first foundational global standard for assessing both …
How to address the main concerns with ISO 27001 implementation
Recently I delivered two webinars on the topic of ISO 27001, and I have asked the attendees to send me their top concerns regarding ISO 27001 implementation before those …
Most organizations unafraid of phishing
ThreatSim released its 2013 State of the Phish Awareness Index, gauging phishing training, awareness and readiness among 300 IT executives, administrators and professionals in …
ENISA issues recommendations for securing data using cryptography
ENISA, the European Union’s “cyber security” Agency, launched a report recommending that all authorities should better promote cryptographic measure to …
Twitter abuse trends and stats
When it comes to Twitter, people still have a large appetite for having a large number of fake followers in order to seem more popular. Fraudsters are cashing in on this in a …
CoverMe: Private texting, sharing and secure phone calls app
CoverMe, a secure texting, document sharing and phone call app, launched today after a beta period. Features include: Make free secure phone calls Send self-destructing …
Week in review: NSA taps Google and Yahoo, breaking game console security, phone calls more dangerous than malware
Here’s an overview of some of last week’s most interesting news and articles: ISO 27001 standard benefits, implementation tips and security controls Dejan Kosutic …
Tips for protecting your personal and business data
As the risk of security breaches continues to become more prevalent, it is increasingly important that consumers and organizations protect their confidential information. …
Security misconceptions among small businesses
More than 1,000 SMBs participated in a joint McAfee and Office Depot survey last month, and the majority (66 percent) felt confident that their data and devices are secure and …
Retail sector slow in adopting new PCI standards
Tripwire announced the results of research on risk-based security management in the retail industry, and the news isn’t good: the majority of the retail sector is yet to …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC