Help Net Security
It’s undeniable, IoT will change security forever
Over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of Things (IoT) by …
Cyber crooks opt for APT method for delivering malware
“Delivering malware without it being flagged by users and security solutions is one of the biggest challenges malware peddlers face. Luckily for them, if they …
Best practices for ensuring compliance in the age of cloud computing
When was the last time you heard someone utter the sentence, “I’m looking forward to the audit next week.” Most likely, never. Since its invention, the word “audit” has struck …
95% of websites in 10 new TLDs are suspicious
Much has changed since the early days of the Internet when the Web had only six common top level domains (TLDs). Back then, what most consumers and businesses encountered were …
Snoopers’ Charter will cause extreme rise in business costs
The UK Government’s Investigatory Powers Bill, dubbed ‘Snoopers’ Charter’ by critics, has already been met with contention from tech giants, Google, Facebook and Microsoft, …
Verizon and Splunk deliver actionable threat intelligence
Verizon Enterprise Solutions launched its Data Breach Investigations Report (DBIR) app for Splunk software. The new free downloadable app helps take the guess work out of …
What’s burning up resources for IT pros during the summer?
IT pros felt the heat this summer as they kept networks humming along for remote workers on vacation. Over the summer months, most organizations see a significant expansion in …
Should a data breach be the kiss of death for the CEO?
The fact that CEOs have tendered their resignations in the aftermath of public breaches is a clear indication that the executive level is being held more accountable for the …
Five years of hardware and software threat evolution
McAfee Labs commemorates the five-year anniversary of the Intel-McAfee union by comparing what researchers thought would happen beginning in 2010 with what actually happened …
Who’s afraid of shadow IT?
One of the biggest disruptions in the IT world is the quantity and quality of SaaS tools. From email and storage, to phone systems and infrastructure, it has never been easier …
Hope is not a strategy, we need more healthy paranoia
35 percent of security experts believe leadership within their organization lacks a healthy paranoia, with 21 percent of leadership “relying on hope as a strategy” …
Should the removal of personal info posted online be a human right?
69% of online Americans agree that the ‘Right to be Forgotten’ should be a human right, 29% think it allows for censorship. Only 16% think the ‘right to be …
Featured news
Resources
Don't miss
- Smart grids are trying to modernize and attackers are treating it like an invitation
- A day in the life of the internet tells a bigger story
- AI vs. you: Who’s better at permission decisions?
- Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
- Portmaster: Open-source application firewall