Help Net Security
Real-time mobile vulnerability management
Mobilisafe launched its cloud-based Mobile Risk Management (MRM) solution, enabling IT to identify and eliminate the significant risks associated with the …
Passing the internal scan for PCI DSS 2.0
Merchants subject to Payment Card Industry Data Security Standard (PCI DSS) rules are often blindsided by DSS changes, arrival of new payment technologies, and newly emerging …
Consumers confused about data breaches
A business’s ability to protect personal information and communicate the circumstances of a data breach can impact customer loyalty and an organization’s …
Siemens enhances security of industrial networks
Siemens announced new versions of its Simatic NET CP 343-1 Advanced and Simatic NET CP 443-1 components with integrated security functions to enable companies to enhance the …
iOS app creates different personas on social networks
Have you ever decided not to post an update because you didn’t want your entire social network to be privy to every intimate detail of your life? Of course you have. …
Information Storage and Management
Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores …
Week in review: New cyber weapon Flame, gamers under attack, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Privacy trends affecting security In this podcast …
Privacy practices of the Internet’s biggest companies
When you use the Internet, you entrust your thoughts, experiences, locations, and more to companies like Google, Twitter, and Facebook. But what happens when the government …
Could security breaches cost lives?
Over a quarter of companies believe that if their sites go down or they suffer a major security breach it could potentially cost customers’ their lives, according to …
HTML5 browser-based, certificateless encryption platform
CertiVox launched the PrivateSky, a service that provides protection for messages, files and other information sent via the cloud through a two-factor authentication process …
Wireless Network Security A Beginner’s Guide
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner’s Guide discusses the many attack vectors …
When syncing sinks your browser
Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance