Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
The mobile security conundrum

Whilst the range and variety of IT security defenses for portable computers – that’s netbooks and laptops to most people – is excellent, and able to cater …

Will we finally see a federal data breach notification law?

Embarrassing losses of personal data, whether due to intrusions into computer networks or sheer carelessness, seemingly are weekly news fodder. The recent PlayStation data …

Business continuity: You need more than just a plan

Stop for a moment and take a look around you – IT isn’t just the computer on your desk, the lap top in your bag or the mobile in your pocket. The truth is …

25 years of mobile security

This year marks the 25th anniversary of my first foray into mobile security. True story. Back in the day, the early halcyon days of mobile computing, any device weighing in at …

A closer look at MainMenu Pro

MainMenu Pro (v3.0.3) is a maintenance tool for the Mac. It enables you to keep your Mac in shape by reclaiming unused disk space, speeding the launch of application, cleaning …

Email archiving challenges

Brian Azzopardi is the product manager for GFI MailArchiver. In this interview he discusses the challenges related to managing email growth and how archiving can help. Why …

Securing the virtual environment

In this video, Dimitri McKay, Security Architect at LogLogic, talks about vulnerabilities and the security challenges surrounding virtual environments: hyperjacking, VM …

WebGL: A new dimension for browser exploitation

WebGL is a new web standard for browsers which aims to bring 3D graphics to any page on the internet. It has recently been enabled by default in Firefox 4 and Google Chrome, …

Governance on unstructured data

Businesses face challenges when implementing sound policies for dealing with their unstructured data, an ever-present thorn in the side of most enterprises today. It is …

The complex information security landscape

In this interview, Latha Maripuri, Director, IBM Security Services and Marc van Zadelhoff, Director of Strategy, IBM Security Solutions, discuss the increasingly complex …

Creating a secure firewall policy for a large company

When it comes to a network security policy, there often seems to be a direct tradeoff between security and maintainability. This doesn’t always have to be the case. Even …

Securing the cloud and securing data in the cloud are not the same

This article will take a look at five of the most impactful vulnerabilities of storing data in the cloud, and offer details on why the most important thing for CSOs and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools