Help Net Security
Small businesses not afraid of data breaches
As the number of data breaches involving smaller businesses continues to grow, a new survey by The Hartford finds that 85 percent of small business owners believe a data …
Tips for safe password use
After the news about the theft of millions of user passwords from the business-based networking site LinkedIn, dating site eHarmony and Last.fm, users should be extra vigilant …
Integrated cloud identity management for the enterprise
SailPoint announced AccessIQ, a solution that integrates cloud access management with identity governance and automated provisioning. It provides services such as single …
CompTIA Security+ eTestPrep (SY0-301)
This custom test engine product is packed with more than 700 practice exam questions, each containing a link to an integrated e-book version of Sybex’s top-selling …
Week in review: LinkedIn password leak, iOS security guide published, Flame spreading via Windows Update
Here’s an overview of some of last week’s most interesting news, videos and articles: Consumers confused about data breaches According to more than 700 survey …
The effect of data breaches on consumers
Commenting on a Ponemon Report showing that 72 per cent of consumers who have been notified of a data breach at a company they had dealt were dissatisfied with the …
Microsoft to release seven bulletins next week
The Microsoft Security Bulletin Advance Notification for June 2012 lists seven bulletins, three of which are rated “critical” and four “important.” The …
Security Metrics, A Beginner’s Guide
Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of …
Over 50% use unauthorized file sharing apps at work
While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …
The rise of Tumblr and Google Play spam campaigns
In May, GFI threat researchers observed a number of attacks focused on Tumblr users including two spam campaigns centred around a fake “Tumblr Dating Game” which …
People would rather lose their wallet than their phone
People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …
Damballa enhances cyber threat protection for ISPs
Damballa announced general availability of CSP 1.7, a cyber threat solution for ISPs and telecommunications providers that detects subscriber malware infections by monitoring …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility