Articles
  • Protecting your child's digital identity

    Each day, as infosec professionals, we dedicate ourselves to protecting our client’s most valuable assets. We spend countless hours focused on keeping data, intellectual property, systems and files out of the hands of cyber criminals. Our clients win and we win—at work. But what are we doing about protecting our most valuable assets at home—our children’s digital identity?

  • Top 3 security, privacy and data protection trends for 2015

    2014 was full of front page stories about data privacy, hacks, data jurisdiction and other threats that confirmed security is no longer a niche. Security is officially a business reality and priority for everyone regardless of size or industry. These macro trends coincided with increased availability of simple secure cloud solutions that take the complexity out of security and the result is dramatic growth and adoption of security solutions.

  • Improving your readiness for OCR audits

    In the wake of healthcare data breaches, OCR audits for HIPAA compliance have become more common – and the consequences have been more highly publicized. But many healthcare providers still don’t know how to prepare effectively for an audit.

    These organizations will be in a bind when random audit season arrives. Providers that might have passed with minimal effort can face serious penalties if they haven’t prepared.

    How can affected organizations prepare more effectively? The first step is to sort fact from fiction.

  • What to expect in the unpredictable world of IT security?

    2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues caught the entire sector by surprise.

    We anticipated, and saw, increases in social engineering exploits, which led to major data breaches at several well-known organizations. Targeted malware campaigns also stepped up, with RAM scraper and ransomware attacks making headlines. Mobile security problems also continued to grow, as employees brought more devices onto organizations’ networks.

  • Preparing for an information audit

    Two ways that an organization can easily and cost efficiently ensure that they are meeting not only security needs but also audit and compliance laws are with role-based access control (RBAC) and two-factor authentication. These two solutions can make a dramatic difference in the way that organizations handle their security measures, and allow them to efficiently address their security needs, as well as any requirements established by the government.

  • Leveraging network intelligence and deep packet inspection

    Tomer Saban is the CEO of WireX Systems, a provider of network intelligence solutions. In this interview he talks about how deep packet inspection helps with identifying emerging threats, the role of network intelligence, and illustrates what the information security industry needs to in the next 5 years to combat highly targeted attacks.

  • The context-aware security lifecycle and the cloud

    Ofer Wolf is the CEO at Sentrix, a provider of cloud-based web security solutions. In this interview he talks about the challenges of delivering enterprise-grade security, explains the role of the context-aware security lifecycle and illustrates how the cloud is shaping the modern security architecture.

  • Tips to avoid online scammers this holiday season

    With Black Friday and Cyber Monday offers, often dramatically cutting prices for one day only, there will be many genuine deals to be had. The problem for many of us is how to spot the real deal, from the scam? Here’s five tips to prevent you gifting your money to the criminals these holidays.

  • Fighting malware, emerging threats and AI

    Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the cloud.

  • User behavior intelligence in the expanding supply chain

    Every business now has a connected ecosystem of partners; even the Department of Defense has a chain of suppliers connected by Internet access. Unfortunately, not all of these businesses are at the same level of sophistication when it comes to their security posture.

Videos      Podcasts



Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //