Help Net Security
New professional certification for cloud security
(ISC)2 and the Cloud Security Alliance (CSA) have signed an agreement to collaborate on a new professional certification for information security. The combined initiative will …
Ubuntu Server 13.04 released
Canonical today announced that Ubuntu Server 13.04 is available for download, featuring high-availability (HA) for OpenStack. “Ubuntu is built for hyperscale and is the …
Photos: Security BSides London 2013
Security B-Sides events are free, community events organised by local individuals, with the express goal of enabling a platform for information dissemination. This …
Cyber attacks on trust expose companies to millions in losses
Every large UK business is open to £247million in possible threat exposure due to a lack of control over cryptographic keys and certificates, the foundation of trust in …
Secured privileged accounts reduce APT exposure
Organizations can reduce the threat of targeted attacks by proactively securing privileged accounts, according to CyberSheath. The theft, misuse and exploitation of privileged …
Adults taking online password security risks
UK adults are risking their online security by using identical or easy to remember passwords on the websites they visit, new Ofcom research reveals. More than half (55%) of …
Free tool to identify risks in secure shell environments
SSH Communications Security, the inventor of the Secure Shell and SFTP protocols, today announced the launch of SSH Risk Assessor (SRA), a free tool that provides users with a …
UK govt gives money to SMEs for improving their cyber security
More small businesses than ever are facing the threat of losing confidential information through cyber attacks, according to research published by the UK Department for …
Checking the security of mobile apps
The number of mobile apps is continually increasing – and the great majority of them can be downloaded for free. They also increasingly handle critical personal, …
The global nature of advanced cyber attacks
FireEye released a report that provides insight into the global nature of malware communication activity related to sophisticated cyber attacks. “The threat landscape …
Is your company ready for a big data breach?
Despite the majority of companies experiencing or anticipating significant cost and business disruption due to a material data breach, they still struggle to take the proper …
Analysis of 5 million scans on 53 million hosts
Qualys has analyzed QualysGuard Policy Compliance (PC) data from more than five million scans performed by organizations worldwide to help enterprises understand key trends as …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade