Help Net Security
Data protection and breach readiness guide
The Online Trust Alliance (OTA) released its 2016 Data Protection and Breach Readiness Guide, which provides prescriptive advice to help businesses optimize online privacy and …
Europe’s cyber security accelerator program helps entrepreneurs
A new program to support cyber security startups will help develop innovative technical solutions. Start ups who want to offer cyber security solutions will be able to get …
How much could a cyber attack cost the HMRC?
HMRC could face compensation claims of over £13 billion if it were to lose people’s personal and financial data as a result of a cyber attack, according to a new study by …
There’s no turning back: Say goodbye to the perimeter
If you’ve been following the announcements from this year’s Consumer Electronics Show is Las Vegas, you couldn’t have missed Ford’s partnership announcement with Amazon. …
The dismal state of payment data security
With acceptance of mobile and other new forms of payments expected to double in the next two years, a new global study shows a critical need for organizations to improve their …
Top drivers of investment in forensic data analytics
Cyber breaches and insider threats, which include malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks according to executives and are …
Threats to the critical information infrastructure on the rise
Citizens and businesses depend on information and communications infrastructure to support online critical services (e.g. energy, telecommunications, healthcare). Increased …
Data security advances on the corporate agenda
Glasswall Solutions issued its top five predictions for 2016. “We believe the next 12 months will see some of the most significant developments in the history of cyber …
The corporate risk factor disclosure landscape
Corporate risks disclosed by public companies in SEC filings often are generic and do not provide investors with clear, concise and insightful information that is …
Week in review: Rise of automation, Google hacking, and Symantec reseller turns to scamming
Here’s an overview of some of last week’s most interesting news, reviews and articles: “Deliberately hidden” backdoor found on US government’s …
Why we need a reality check on passwords
Given all the recent and historical news on data breaches of personal e-mail accounts, social media accounts and even phone account passwords, it is every wonder therefore …
Organizations are spending ineffectively to prevent data breaches
A new report by 451 Research, which polled 1,100 senior IT security executives at large enterprises worldwide, details rates of data breach and compliance failures, …
Featured news
Resources
Don't miss
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed