Secure file storage and sharing with nCrypted Cloud

Posted on 20 November 2014.  |  nCrypted Cloud adds a strong security layer to the data used and shared via popular cloud-based data storage providers.

Does cyber insurance help the CISO get a seat in the boardroom?

Posted on 19 November 2014.  |  CISOs and cyber security leaders have long struggled to gain a voice in the boardroom.

Risk assessment benefits, best practices and pitfalls

Posted on 18 November 2014.  |  Ryan Ward, CISO at Avatier, talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, and more.

Trojanized Android firmware found on inexpensive handhelds

Posted on 18 November 2014.  |  It's unfortunate, but true: we live in a world where even if we buy a brand new mobile phone, it's no guarantee that it's malware-free.

The evolution of threat detection and Big Data

Posted on 17 November 2014.  |  Mark Gazit, CEO of ThetaRay, talks about leveraging Big Data to secure networks, the advantages of using math-based anomaly detection as well as the evolution of threat detection in the past decade.

Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
Events
INTERPOL World 2015
14 April - 16 April 2015.
Security Forum 2015
22 April - 23 April 2015.

Editor's choice

User behavior intelligence in the expanding supply chain

21 November 2014. | Every business now has a connected ecosystem of partners. Unfortunately, not all of these businesses are at the same level of sophistication when it comes to their security posture.

How the threat landscape is shaping the network security business

20 November 2014. | Pat Calhoun is the Senior Vice President & General Manager, Network Security, at McAfee. In this interview he talks about constructing the strategic direction for McAfee’s Network Security business, and more.

Secure file storage and sharing with nCrypted Cloud

20 November 2014. | nCrypted Cloud adds a strong security layer to the data used and shared via popular cloud-based data storage providers.

Sophisticated Android-based botnet a danger to enterprise networks

19 November 2014. | A new and stealthy version of the NotCompatible Android Trojan continues to strengthen one of the most advanced mobile botnets ever to exist.

Does cyber insurance help the CISO get a seat in the boardroom?

19 November 2014. | Some CISOs simply serve as scapegoats, accepting blame when breaches occur and ignored when the horizon is clear.

Risk assessment benefits, best practices and pitfalls

18 November 2014. | Ryan Ward, CISO at Avatier, talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, and more.

The evolution of threat detection and Big Data

17 November 2014. | Mark Gazit, CEO of ThetaRay, talks about leveraging Big Data to secure networks, the advantages of using math-based anomaly detection as well as the evolution of threat detection in the past decade.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //