Articles
  • Using Hollywood to improve your security program

    I spend a lot of time on airplanes, and end up watching a lot of movies. Some of my favorite movies are adventures, spy stuff, and cunning heist movies. Recently, I realized that a lot of these movies provide great lessons that we can apply to information security.

  • Layered security in the cloud

    When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. Two of the main differences are elasticity and dynamism, which are part of the cloud’s DNA.

    The fact that security-related components can be easily tested, evaluated and deployed allow many companies - both existing and newly established start-ups - to launch their solutions also or solely in the public cloud. Moreover, I argue that by combining the tools supplied by a cloud provider with external third party solutions, higher levels of security - not to mention peace of mind - are achieved.

  • 9 tips for communicating your BYOD policy

    If an IT department creates a BYOD policy and no one at the company knows about it, does it actually make an impact? I’ll spare you the suspense - the answer is no.

    With the majority of employees now using personal devices for work, establishing a BYOD policy is vital for companies that want to ensure productivity, security and smooth operations. But creating guidelines is only half the battle. The real challenge is making sure that employees know that the policy exists and they can easily follow it.

    Getting employees to pay attention to new rules is no simple task, however. Here are some ways to make sure that employees are listening to and internalizing BYOD guidelines.

  • The evolution of backup and disaster recovery

    In this interview, Amanda Strassle, IT Senior Director of Data Center Service Delivery at Seagate Technology, talks about enterprise backup issues, illustrates how the cloud shaping an IT department's approach to backup and disaster recovery, and much more.

  • The 25th anniversary of the firewall: Celebrating a new generation

    This month marks the 25th anniversary of the firewall and, like a parent looking back on the life of his children, I wonder where the time went. The McAfee Infographic that depicts the ‘lifetime’ of the firewall is open on my laptop and I’m a little nostalgic as I remember the events that were part of its evolution. Then, one milestone in particular catches my eye. The infographic illustrates that the discussion around the need for a so-called Next Generation Firewall (NGFW) began with Gartner as early as 2003.

Videos      Podcasts



Spotlight

Almost 1 in 10 Android apps are now malware

Posted on 28 July 2014.  |  Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses. This is a 153% increase from the number of infected files in 2013.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //