Help Net Security
IoT devices facilitate robbery, stalking and cybercrime
The foundation of the Internet of Things (IoT) – the devices themselves plus their associated mobile applications and cloud services – are often not designed with …
CSA to hold hackathon featuring $10,000 prize
The Cloud Security Alliance (CSA) will hold its third Hackathon at the RSA Conference 2015 in San Francisco, to continue to test the CSA Software Defined Perimeter …
Qualys experts and customers to present security best practices at RSA Conference 2015
The Qualys CEO Philippe Courtot will deliver the opening keynote presentation at CSA Summit during RSA Conference 2015. The keynote discusses how the cloud has forced …
What happens to data after a breach?
Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, …
How to protect from threats against USB enabled devices
Reports have been circulating that e-cigarette chargers from China were corrupted and infected machines with malware. Many journalists took the story at face value, even …
Week in review: Security tips for DevOps, and how security pros deal with cybercrime extortion
Here’s an overview of some of last week’s most interesting news, reviews and articles: 10 practical security tips for DevOps More organizations are embracing …
Boards must up their game before the hackers claim checkmate
In today’s climate, the cyber security paradigm is a reactive cycle. When a threat is uncovered, it is examined and a counter-measure is created, with response times …
Digital privacy and Internet security to intersect at Digital Rights Europe
Digital Rights Ireland, Ireland’s leading digital rights advocacy group, has gathered an expert group of Irish and international speakers for the inaugural Digital …
Guidelines on the auditing framework for Trust Service Providers
A new ENISA report provides guidelines on the auditing framework for Trust Service Providers (TSPs). These guidelines can be used by TSPs (preparing for audits) and Conformity …
Crypto ransomware sightings and trends for Q1 2015
It seems that cybercriminals have yet to tire of creating crypto-ransomware malware. Since the start of 2015, we have spotted several variants of crypto-ransomware plague the …
How vulnerable is our critical national infrastructure?
Considered the backbone of the nation’s economy, security and health; critical infrastructure provides power, water, transportation, and communications systems relied on …
What’s complicating your security readiness?
The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment …
Featured news
Sponsored
Don't miss
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations
- How to start your cybersecurity career: Expert tips and guidance
- MISP: Open-source threat intelligence and sharing platform