Securing the U.S. electrical grid

Posted on 25 August 2014.  |  In this interview, Dan Mahaffee, the Director of Policy at CSPC, discusses critical infrastructure security.

Kelihos botmasters target Russian patriots to expand botnet

Posted on 25 August 2014.  |  The cyber crooks behind the Kelihos botnet are, once again, trying to swell the number of computers included in it.

Inside the ISO 27001 Documentation Toolkit

Posted on 25 August 2014.  |  You work for a small or medium company and you'd like to become compliant, but budget is always an issue. The ISO 27001 Documentation Toolkit is here to help.

Sneak attack through smartphone shared memory

Posted on 22 August 2014.  |  A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users.

Extracting encryption keys by measuring computers' electric potential

Posted on 22 August 2014.  |  A group of researchers have demonstrated new and unexpected ways to retrieve decryption keys from computers.

Spotlight

Why IT security is broken and how math can save it

Posted on article.php?id=2107  |  Stuart McClure, CEO at Cylance, talks about how the information security industry has evolved when it comes to detecting bad guys, but it's being mostly reactive and not proactive.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Aug 27th
Events
Cyber Security EXPO 2014
08 October - 09 October 2014.
McAfee FOCUS 14
27 October - 29 October 2014.

Editor's choice

Why every security-conscious organization needs a honeypot

27 August 2014. | Honeypots make perfect network security canaries, and can improve any organizationís defense.

How important is website security?

26 August 2014. | Nicholas Sciberras, Product Manager at Acunetix, illustrates why website security should be a priority in any organization.

Securing the U.S. electrical grid

25 August 2014. | In this interview, Dan Mahaffee, the Director of Policy at CSPC, discusses critical infrastructure security.

Inside the ISO 27001 Documentation Toolkit

25 August 2014. | You work for a small or medium company and you'd like to become compliant, but budget is always an issue. The ISO 27001 Documentation Toolkit is here to help.

Securing networks in the Internet of Things era

22 August 2014. | The IoT will probably represent the biggest change to our relationship with the Internet since its inception.

How the role of the CSO is changing

21 August 2014. | Rick Howard, CSO at Palo Alto Networks, talks about the role of the CSO and how it's fundamentally changing.

Review: iStorage datAshur Personal secure USB flash drive

20 August 2014. | This PIN-activated USB flash drive is designed for everyday use, both private and corporate.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //