Help Net Security
The evolution of vendor risk management in financial institutions
The Financial Services industry has long been recognized as a leader in establishing many of the security and fraud detection practices that have influenced best practices in …
What pokes holes in virtual environments?
While most companies believe virtualization technology is a strategic priority, there are clear risks that need to be addressed. Ixia surveyed more than 430 targeted …
When it comes to cloud apps, companies are left in the dark
More than two-thirds (67 per cent) of organizations admit that unauthorized cloud applications are being implemented without IT’s knowledge or involvement, and …
Microsoft releases EMET 5.2
Microsoft has released version 5.2 of its Enhanced Mitigation Experience Toolkit (EMET), a free utility that can detect and block exploitation techniques that are commonly …
Cutting-edge security research comes to Amsterdam
Held once again at De Beurs van Berlage, HITB2015AMS takes place from the 26-29 May 2015 and runs alongside HITB Haxpo, a 3-day technology expo for hackers, makers, builders …
Online trust is at the breaking point
IT security professionals around the globe believe the system of trust established by cryptographic keys and digital certificates, as well as the security of trillions of …
Week in review: Shadow IT, crypto-ransomware goes after gamers, and the security of smartwatches
Here’s an overview of some of last week’s most interesting news and articles: Hack yourself first: How we can take the fight to the black hats Threats are no …
Preventing fraud through enterprise password management
The past few years the world has seen various incidents where students have fraudulently modified their school grades, progress reports and attendance records. Recently, there …
Defending against PoS RAM scrapers
Stealing payment card data has become an everyday crime that yields quick monetary gains. Attackers aim to steal the data stored in the magnetic stripe of payment cards, …
Most businesses fail interim PCI compliance assessment
Nearly 80 percent of all businesses fail their interim PCI compliance assessment, leaving them vulnerable to cyberattacks, according to Verizon’s 2015 PCI Compliance …
Listen to your employees or deal with shadow IT
Data leakage, compliance breaches, business inefficiency and hidden costs are just some of the risks organizations are leaving themselves open to by not meeting the IT demands …
2,400 unsafe mobile apps found in average large enterprise
The average global enterprise has approximately 2,400 unsafe applications installed in its mobile environment, according to Veracode. Based on an analysis of hundreds of …
Featured news
Sponsored
Don't miss
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations
- How to start your cybersecurity career: Expert tips and guidance
- MISP: Open-source threat intelligence and sharing platform