Help Net Security
Week in review: Rethinking security, LastPass breach, and stronger data protection rules for Europe
Here’s an overview of some of last week’s most interesting news, podcasts and articles:How data-centric security worksIn this podcast recorded at Infosecurity …
The state of cyber security in Thailand
Thailand – the land of smiles – invited me as a panelist to the CSA ASEAN 2015 summit. Bangkok, with its fantastic street food, smiling people and general …
Linux container security and certification concerns remain
While container adoption is likely to surge in the next few years, concerns around security, certification and adequate skills remain, according to Red Hat.A survey of more …
How engaged is the average board when it comes to security?
Tripwire evaluated the attitudes of executives as they relate to cybersecurity risk decision-making and communication between IT security professionals, executive teams and …
U.S. Open primer: In the cloud or on the golf course, hazards can be devastating
This week the U.S. Open heads to the Pacific Northwest for the very first time. Chambers Bay Golf Course in Washington State will play host. Anyone familiar with this course …
Static encryption keys affect SAP security
Yesterday, Dmitry Chastukhin, Director of Professional Services at ERPScan, presented a report on the latest SAP security trends at the Black Hat Sessions conference in the …
Relying on your insurer for security? Think again!
Data breaches are a regular occurrence, one need simply look at the papers to read about the myriad of breaches that have occurred over the last year. From the Sony attack in …
EFF delves into privacy practices of Apple, Google, Twitter, and others
Our digital lives are leaving data trails through social networking sites, email providers, Internet service providers, and mobile apps. But which companies fight the hardest …
Why break in, if you can simply login?
I was asked the other day why so many security breaches are hitting the headlines and are seemingly getting larger and more frequent. The game of cyber security has changed …
Zero Trust approach to network security
Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.With Zero Trust there …
86.2 million phone scam calls delivered each month in the U.S.
Phone fraud continues to threaten enterprises across industries and borders, with the leading financial institutions’ call centers exposed to more than $9 million to potential …
Emulating the security analyst with software
This is the second installation of a two-part article discussing why static security detection methods can no longer protect enterprises from advanced hacking efforts. In this …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)