Help Net Security
Battles over online information control to escalate
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous …
Free ebook identifies easy to manage network security vulnerabilities
nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …
Businesses bracing for security impact on Cyber Monday
Most employees are not able to recognize online threats against the corporate network and companies are most concerned that online shopping could open the network to potential …
RSA enhances risk-based authentication solution
RSA announced enhancements to the RSA Adaptive Authentication On Premise solution designed to help organizations in wide range of industries achieve the right balance of …
Norton Mobile Security adds protection for iOS
Norton by Symantec released the latest version of Norton Mobile Security which delivers protection for consumers’ mobile needs, including support for iOS devices. New …
Video: Why privacy matters
Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and …
PCI Council adds guidelines for data security risk assessment
The PCI Security Standards Council (PCI SSC) released the PCI DSS Risk Assessment Guidelines Information Supplement, a product of the PCI Risk Assessment Special Interest …
Tips for safe online shopping
Veracode released a new infographic, “Identity Theft: Staying Safe in an Online World,” that provides practical tips for keeping personal information safe when …
The right to be forgotten: Between expectations and practice
The right to be forgotten is one of the elements of the new proposed regulation on data protection of the European Commission. The right allows people to ask for digitally …
Google Chrome App grabs identities, forges blogs in victims’ name to promote scam
A Google Chrome app that promises to change the color of Facebook accounts instead nabs authentication cookies and generates dozens of blogs registered to the victims’ …
Video: Incident response and cloud computing
Moving into a cloud environment can bring many advantages to organizations in terms of flexibility, scalability and other benefits. However, it also brings a number of …
81% don’t trust cloud security
81 percent of IT professionals express security concerns when moving data to the cloud, according to a recent survey by GreenSQL. The survey focused on one question: …
Featured news
Resources
Don't miss
- How enterprise leaders can secure and govern agentic AI
- Background check, drug testing provider DISA suffers data breach
- China-based Silver Fox spoofs healthcare app to deliver malware
- Cybersecurity needs a leader, so let’s stop debating and start deciding
- Avoiding vendor lock-in when using managed cloud security services