Articles
  • Integrating IT security at the board level

    Eisk is usually only managed at the board level once a major attack has taken place, which, besides being by far the most expensive way to resolve such problems, is neither logical nor sustainable.

    Cybercrime must be tackled from the top down in a proactive and strategic way in order to prevent such crippling financial and reputational damage from occurring on a regular basis.

  • Seven Destiny video game tactics that translate to cyber security

    Why learn by grinding through dry security best practices when you can make education unique by mixing in a little geeky fun? In the third installment of my security pop culture series (see Part 1/Part 2), I share what Destiny – Bungie’s popular new MMOFPS video game – can teach you about network and information security. Learn how to become an Internet Guardian and fight the encroaching cyber Darkness with these seven tips.

  • How can parents keep their children safe on the Internet?

    In today’s society, children are unquestionably more tech-savvy than ever before, with far greater access to gadgets and a veritable wealth of information at their fingertips along with a heightened understanding of technology and how it works. However, children will not be as aware of the scams that cyber-criminals are crafting specifically to dupe them.

  • How consumers foot the bill for data breaches

    Data breaches are almost always expensive and somebody always ends up paying those expenses somewhere down the line. Either because they were affected directly and have no one to pass the costs onto or because they had the costs passed onto them by someone else.

    This applies to breaches on corporate, government or individuals’ data. However, some of the most expensive hacks that do occur regularly are typically those affecting major companies.

  • Discover Cyber Security EXPO

    In this interview, Mark Steel, CEO at IP EXPO Europe, talks about Cyber Security EXPO, taking place this week in London.

  • Modes of defense against security breaches in healthcare

    Simply watching the news is enough to make it clear that major security breaches in healthcare are on the rise, and the issue is only set to become more pronounced with expanding adoption and use of electronic health records. These technologies offer great promise for patients – but they also mean new risks and security requirements.

    Along with new threats have come new rules: OCR audits for compliance with HIPAA/HITECH privacy and security rules are affecting more and more healthcare providers. In this fraught landscape, how can organizations protect themselves? There are three essential prongs of defense for a comprehensive security strategy.

  • Password security is not just a user problem

    A lot has been said about multi-factor authentication, and it can add quite a bit of security to a system. However, some of the implementations I’ve seen have some real issues. Here are some things to look for – either in your own systems, or those run by your partners and suppliers

  • Education is the key to increasing mobile security

    In order to empower people to take control of their digital assets, consumers must first understand that simply picking a pet’s name and adding a 1 to the end for a password or using a four digit PIN based on their date of birth is not enough to secure the wealth of information they carry around in their pockets.

    A person’s digital identity is worth a significant amount to the right hackers and everyone needs to ensure they take the maximum precautions available to counteract this security threat.

  • How threats shape cloud usage

    In this interview, Ravi Ithal, Chief Architect at Netskope, discusses the top threats to cloud security and how they are changing the way we're using the cloud. He also talks about how the power of the cloud influences the agility of a modern security architecture and offers insight about who is ultimately responsible for data security in the cloud.

  • We can fix security, but it’s not going to be easy

    When I think about computer security, I like to go back to its early days and compare the situation then with the situation now. Taking a step back is very useful because, even though we work very hard, we need to ask ourselves if we’re making things fundamentally better. In other words, are we focusing our efforts on the right problems?

Videos      Podcasts



Spotlight

Fake "Online Ebola Alert Tool" delivers Trojan

Posted on 29 October 2014.  |  Cyber scammers continue to take advantage of the fear and apprehension surrounding the proliferation of the Ebola virus.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //