Articles
  • Planning for the Internet of Things

    As organizations plan for the future, and how security has to operate within their business, they now have to worry about the Internet of Things (IoT). There's a clear need to put in place the right thinking, approaches, technologies and security strategies in order to stay ahead of the threats and deal with the complexities ahead.

    In this podcast recorded at RSA Conference 2015, Geoff Webb, Director of Solution Strategy at NetIQ, discusses the implications and likely impact of the Internet of Things.

  • The invasion of biometrics

    Biometrics as a means of unique identification is common place today and it’s going to be even more so as tomorrow becomes today. But how would you feel about having your DNA mapped and your network of veins and capillaries used to identify you? It might sound far-fetched but not as far as you think – Steve Bell, Security Expert at BullGuard takes a look at what the future may hold.

  • The ticking cybersecurity risk: Managing wearable tech in the workplace

    Smartphones and tablets took time to effectively crossover from consumer device to business staple. Wearables, despite still being the infants of IT hardware, are already starting to make that leap.

  • How can organizations adapt to the rise in data breaches?

    There’s more money currently dedicated to stopping data breaches than ever before; however, this money isn’t always being sent in the right direction to truly put a stop to the problem.

  • Five misunderstandings about cloud storage

    Cloud storage is a solution that users are driving IT organizations to use whether we want to or not. Just ask a sales person what they use. They will tell you how great it is and how they use it. As IT organizations, we need to take notice and understand the impact to our process and the effect to the data stored outside of our organization. Here are five things commonly misunderstood about cloud storage.

  • The need for end-user visibility in a Bring Your Own Anything environment

    Mobiles, tablets, PCs, applications, cloud services - employees are increasingly bringing non-company devices into their organizations and connecting them to everything they need to do their jobs. As this phenomenon clearly goes way beyond devices alone, I’d suggest that the oft-used acronym BYOD is no longer sufficient, and should perhaps be replaced with BYO* - bring your own anything and everything.

  • How to protect from threats against USB enabled devices

    USB can be an effective and simple route to infection. Take a thumb drive for example. It is child’s play to load malware on one and a disgruntled employee could easily do so to infect an organization for unfair treatment. There is also malware that specifically targets USB devices and can spread when they are plugged into other machines. A more common infection route may be the inadvertent installation of a virus onto the drive from already infected files, similar to when floppies spread viruses, then CDs and later on DVDs. The problem is that there is a wide range of USB devices which can harbor these kind of nasties – from USB hard drives to smartphones to even the seemingly innocent iPod.

  • Boards must up their game before the hackers claim checkmate

    In today’s climate, the cyber security paradigm is a reactive cycle. When a threat is uncovered, it is examined and a counter-measure is created, with response times varying from weeks to years.

    The problem is that attackers have the ability to quite easily reuse the previous pieces of malware, modify them and then build a brand new threat, therefore bypassing the new and updated security measures. Effectively, the connected world is under siege and current security solutions and approaches are outdated and inadequate.

  • How vulnerable is our critical national infrastructure?

    Considered the backbone of the nation’s economy, security and health; critical infrastructure provides power, water, transportation, and communications systems relied on to connect us with our friends and family to our communities. Utility, oil and gas, manufacturing and alternative energy organizations are fending off cyber attacks on a daily basis. From activist groups to state-sponsored hackers, our nations’ critical infrastructures are targeted regularly in an attempt to disrupt services and cause havoc.

  • I don’t need friends, I have followers

    Admittedly, I didn’t really mean to utter those words but found them coming out of my mouth nonetheless. Well what else do you say when an eight year old ridicules you because they have more friends? In my defense, the response was never truly serious, and was born out of the research for the next book titled “The (un)social network.”

Videos      Podcasts



Spotlight

Planning for the Internet of Things

As organizations plan for the future, and how security has to operate within their business, they now have to worry about the IoT. Geoff Webb, Director of Solution Strategy at NetIQ, discusses the implications and likely impact of the Internet of Things.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Apr 27th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //