Help Net Security
IPS still mainly deployed at the perimeter, doing a good job
SANS announced the results of a new survey on network security sponsored by HP. 439 survey responses show that IPS is still mainly deployed at the perimeter and is doing a …
Week in review: PHP.net compromise, Facebook data mining, and how to social engineer a social network
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: The Basics of Web Hacking: Tools and Techniques to Attack the Web …
WordPress 3.7 delivers important architectural updates
WordPress 3.7, named Basie, is available for download or update in your WordPress dashboard. Updates include: Updates while you sleep: With WordPress 3.7, you don’t have …
Cloud strategies and adoption
The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend, according to Gartner. 2016 will be a defining year for cloud …
Insider threat: Users are out of control
Employees are granted excessive privileges and access for their particular roles resulting in unnecessary risks to organizations. One of the most startling statistics from a …
Microsoft releases Sigcheck 2.0
Sigcheck is a command-line utility that shows file version number, timestamp information, and digital signature details, including certificate chains. Version 2.0 adds …
Secure file sharing for Mac with native OS X integration
Infrascale released FileLocker for Mac, with native OS X integration. OS X users now have direct access to File Locker’s Ultrasafe features as well as Private Cloud …
Security now the top issue for network managers
Security returns to the top of the list of network manager ‘pain points.’ Conducted earlier in 2013, TheInfoPro study identifies key initiatives of senior …
DARPA announces cyber defense tournament with a $2 million cash prize
What if computers had a “check engine” light that could indicate new, novel security problems? What if computers could go one step further and heal security …
What has changed in ISO 27001?
Learn what has changed in ISO 27001 using this easy to understand infographic, click the image to get the complete version: The key differences are detailed including: Most …
Most young adults not interested in a cybersecurity career
While U.S. government officials find the current pipeline for cybersecurity talent to be lacking, 82 percent of U.S. millennials say no high school teacher or guidance …
Cyber attacks targeting the energy sector on the rise
Alert Logic examined the rise of cyber attacks targeting the energy sector—an industry thought to be particularly at risk due to the highly confidential and proprietary …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring