81% of healthcare organizations have been compromised

Only half feel that they are adequately prepared in preventing attacks, according to KPMG.

Malvertising campaigns increase 325 percent

Cyphort investigated the practices used by cyber criminals to inject malicious advertisements into legitimate online advertising networks.

Combatting human error in cybersecurity

Mistakes do play a part in security breaches, more often than not it’s a far simpler mistake: innocent errors of judgment that are leaving businesses and government networks exposed to massive data loss and financial ruin.

Cloud security: Essential yet complicated

In this interview, Ron Zalkind, CTO and co-founder of CloudLock, talks about the top cloud security threats.

Redefining security visualization with Hollywood UI design

ProtectWise CEO Scott Chasin and CTO Gene Stevens wanted to give users a helpful security tool with an interactive visual dashboard that looks straight out of Call of Duty.

Spotlight

Proactive real-time security intelligence: Moving beyond conventional SIEM

Discussions about security intelligence still focus primarily around conventional reactive SIEM. Security pros need to move from this reactive model to proactively using this security intelligence to protect their businesses.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Aug 28th
Events
(ISC)2 Security Congress
28 September - 01 October 2015.
Cyber Security Europe 2015
07 October - 08 October 2015.
HITB GSEC Singapore
12 October - 16 October 2015.

Editor's choice

Proactive real-time security intelligence: Moving beyond conventional SIEM

In today’s complex landscape security pros need to move from this reactive model to proactively using this security intelligence to protect their businesses.

Protect against privileged credential attacks with zero trust

IT security won’t get any better until we take a different approach to security and adopt a new paradigm: the zero-trust model.

Effective security starts with UX

The biggest contributors to security budget spend are the short-term, lower-priority challenges of internal compliance errors and accidental data leaks.

How to get better at web application security

Robert Hansen, VP of WhiteHat Security Labs, offers advice on how to improve web application security practices.


    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //