Help Net Security
Cisco unveils threat-focused next-generation firewall
Cisco introduced a threat-focused Next-Generation Firewall (NGFW). Cisco ASA with FirePOWER Services provides the full contextual awareness and dynamic controls needed to …
(IN)SECURE Magazine issue 43 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 43 has been released today. Table of contents: …
System failures cause most large outages of communications services
The European Union Agency for Network and Information Security (ENISA) published a report about large-scale outages in the electronic communication sector. It provides an …
Dragonfly malware targeting pharmaceutical companies
The recently revealed Dragonfly (Havex) malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed, according to Belden. Until now, …
Emerging cloud threats and how to address them
As organizations deploy and harness private, community and hybrid clouds, they encounter new types of threats, along with the old ones they’ve been battling for years. …
Video: Reactions of engineers under GCHQ surveillance
Filmmakers Katy Scoggin and Laura Poitras follow reporter Marcel Rosenbach as he informs the staff of a German communications firm that they have been targeted for …
Best practices for skimming prevention
The PCI Security Standards Council released an update to its guidance for merchants on protecting against card skimming attacks in POS environments. Card skimming continues to …
75% of mobile apps will fail basic security tests
Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner. Enterprise employees download from app stores and use mobile …
Week in review: Security experts discuss Apple Pay, Salesforce hit with targeted attack
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Mobile forensics in a connected world In this interview, Andrew …
Securing virtual machines: Considerations for the hybrid cloud
With enterprises’ growing interest in adopting the hybrid cloud, Cloud Service Providers (CSPs) want to develop premium cloud offerings that fuel the rate of this …
Everything you need to know about POS malware
With this year’s dramatic uptick in data breaches targeting retailers and restaurant chains and, more specifically, the payment card data they process every day, …
Internet of Things to make CISOs redefine security efforts
By year-end 2017, over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of …
Featured news
Sponsored
Don't miss
- Ransomware gang targets IT workers with new RAT masquerading as IP scanner
- Researchers unearth MotW bypass technique used by threat actors for years
- ITSM concerns when integrating new AI services
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment