Help Net Security
Cyber crooks opt for APT method for delivering malware
“Delivering malware without it being flagged by users and security solutions is one of the biggest challenges malware peddlers face. Luckily for them, if they …
Best practices for ensuring compliance in the age of cloud computing
When was the last time you heard someone utter the sentence, “I’m looking forward to the audit next week.” Most likely, never. Since its invention, the word “audit” has struck …
95% of websites in 10 new TLDs are suspicious
Much has changed since the early days of the Internet when the Web had only six common top level domains (TLDs). Back then, what most consumers and businesses encountered were …
Snoopers’ Charter will cause extreme rise in business costs
The UK Government’s Investigatory Powers Bill, dubbed ‘Snoopers’ Charter’ by critics, has already been met with contention from tech giants, Google, Facebook and Microsoft, …
Verizon and Splunk deliver actionable threat intelligence
Verizon Enterprise Solutions launched its Data Breach Investigations Report (DBIR) app for Splunk software. The new free downloadable app helps take the guess work out of …
What’s burning up resources for IT pros during the summer?
IT pros felt the heat this summer as they kept networks humming along for remote workers on vacation. Over the summer months, most organizations see a significant expansion in …
Should a data breach be the kiss of death for the CEO?
The fact that CEOs have tendered their resignations in the aftermath of public breaches is a clear indication that the executive level is being held more accountable for the …
Five years of hardware and software threat evolution
McAfee Labs commemorates the five-year anniversary of the Intel-McAfee union by comparing what researchers thought would happen beginning in 2010 with what actually happened …
Who’s afraid of shadow IT?
One of the biggest disruptions in the IT world is the quantity and quality of SaaS tools. From email and storage, to phone systems and infrastructure, it has never been easier …
Hope is not a strategy, we need more healthy paranoia
35 percent of security experts believe leadership within their organization lacks a healthy paranoia, with 21 percent of leadership “relying on hope as a strategy” …
Should the removal of personal info posted online be a human right?
69% of online Americans agree that the ‘Right to be Forgotten’ should be a human right, 29% think it allows for censorship. Only 16% think the ‘right to be …
EMEA organizations are being pre-emptive about security
In EMEA, organisations are being pre-emptive about security due to the increasing threat posed by targeted attacks. These threats take the form of cyber-attacks that lie …
Featured news
Resources
Don't miss
- GitHub project maintainers targeted with fake security alert
- Pay, fight, or stall? The dilemma of ransomware negotiations
- Review: Cybersecurity Tabletop Exercises
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards