Help Net Security
Innovation must not come at the price of security
One of the main themes to come out of CES has been the advancement of the Connected Human. Whilst we can’t commute to work on a Hoverboard just yet, “Sent From My …
State of the Internet: Attack traffic, DDoS, IPv4 and IPv6
Akamai today released its latest State of the Internet report, which provides insight into key global statistics such as connection speeds and broadband adoption across fixed …
Compromised credentials in enterprise cloud apps
A new Netskope report shows a continued increase in cloud app usage across enterprises, as well as the high volume at which files are being shared outside of a given …
The coming shift in security
Vendors continue to trumpet new platforms as the best way to improve enterprise-level security. Flashy spinning visualizations, added scalability and the meaningless …
Top fraud and corruption trends
Highlighted by a dramatic rise in cyber security risk across all industries, EY Fraud Investigation & Dispute Services (FIDS) unveiled its top fraud and corruption trends …
Top 3 reasons businesses should prioritize web security
2014 was a year of high-profile hacks for businesses around the world. From The Home Depot breach to the recent Sony data leak, it seemed like as soon as one data breach was …
The one compliance lesson you need to learn
We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. At the same time, we have seen an influx …
NETGEAR ReadyNAS 200 enables data protection
NETGEAR is expanding its family of NAS devices with the performance-driven ReadyNAS 200 Series for home and home office networks. ReadyNAS 200 transfers files up to an amazing …
Kensington unveils thinnest security lock for ultrabooks and tablets
Kensington announced the MiniSaver Mobile Lock, the thinnest security lock system with the Kensington mini security slot technology – for use on ultra-thin mobile …
Toshiba releases FlashAir III wireless SD card
Toshiba introduced the FlashAir III wireless SD card, a third generation memory card that serves as its own wireless LAN access point, allowing users to share images, videos …
Rails security scanner Brakeman 3.0.0 released
Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at …
Four cyber security risks not to be taken for granted
It’s pretty difficult to make information security predictions, and even more difficult to verify them afterwards: we can only judge the effectiveness of information …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)