Help Net Security

Alec Baldwin to deliver closing RSA Conference 2015 keynote
Television and film star Alec Baldwin will be part of the closing ceremonies for RSA Conference 2015 taking place on Friday, April 24th in San Francisco, CA. Celebrated as one …
MitM, DoS bugs in Network Time Protocol squashed
Two vulnerabilities affecting Network Time Protocol (NTP), which is used for synchronizing clocks of computer systems, have been patched and made available in the latest …
Polymorphic Beebone botnet sinkholed in international police operation
On April 8, a global operation targeted the Beebone (also known as AAEH) botnet, a polymorphic downloader bot which installs various forms of malware on victims’ …
The need for end-user visibility in a Bring Your Own Anything environment
Mobiles, tablets, PCs, applications, cloud services – employees are increasingly bringing non-company devices into their organizations and connecting them to everything …
Cybercrime gets easier, attribution gets harder
Threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise, according to Websense. Redirect chains, code recycling and a …
Securing high-risk, third-party relationships
High-profile attacks reveal that malicious hackers target third-party vendors and supply chain partners as a backdoor into their primary target, according to CyberArk …
Guide outlines specifications of smart card-based PACS
Smart cards are increasingly accepted as the credential of choice for securely authenticating identity, determining appropriate levels of information access and controlling …
Are you prepared for dealing with a breach?
RSA, The Security Division of EMC, released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey …
IoT devices facilitate robbery, stalking and cybercrime
The foundation of the Internet of Things (IoT) – the devices themselves plus their associated mobile applications and cloud services – are often not designed with …

CSA to hold hackathon featuring $10,000 prize
The Cloud Security Alliance (CSA) will hold its third Hackathon at the RSA Conference 2015 in San Francisco, to continue to test the CSA Software Defined Perimeter …

Qualys experts and customers to present security best practices at RSA Conference 2015
The Qualys CEO Philippe Courtot will deliver the opening keynote presentation at CSA Summit during RSA Conference 2015. The keynote discusses how the cloud has forced …
What happens to data after a breach?
Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption