Articles
  • Behavioral analysis and information security

    In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security, how behavioral analysis can influence the evolution of security technologies and offers several behavioral analysis strategies.

  • How to keep your contactless payments secure

    Contactless payments actually have the same level of protection as chip and PIN payment cards, but don’t require the user to enter a PIN number. Rather, to send data, most contactless cards use radio technology (RF) or the newer near field technology (NFC) that turns a smartphone into a digital wallet.

    Over the last decade, researchers have shown that fraudsters can pickpocket a victim’s financial data using a dedicated amplifier, an antenna and other low-cost electronics that can fit into a rucksack.

    Here are the top security threats you should be aware of if you’re using a RF-based card, along with our top safety tips to keep your payments secure.

  • Security compliance is necessary for real-time mobile data access

    Security compliance often varies from organisation to organisation due to varied industry regulation as well as internal security policies and procedures. We often see organisations attempt to repurpose security frameworks from the PC world and apply them to mobile. Mobile is fundamentally different than other enterprise technology and therefore requires a revised approach to security policies and countermeasures.

  • How to talk infosec with kids

    As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like me, chances are you’re concerned about your kids using the Internet.

    As they live digital lives, we need to become digital parents. You’d think that would come easily, given that we work in cybsersecurity, but I’m continually surprised to hear how many of my tech colleagues don’t talk about the dangers they see on their screens at work back at home with their kids. Instead, their strategy is a mixture of hope and worry. They hope something bad doesn’t happen to their kids – they don’t click on a bad link – and then they restrict their kids screen time.

  • Bug bounty programs: The road to hell is paved with good intentions

    Bug bounties are in the news again. The main problem is that once a bounty program is in place, hackers of all type of qualification and ethics consider it a green light to attack the system. The issue here is that these are frequently hackers with very modest or even without experience of professional security testing, who can actually damage the system they are probing.

  • Emerging cloud threats and how to address them

    As organizations deploy and harness private, community and hybrid clouds, they encounter new types of threats, along with the old ones they've been battling for years. Many of these threats come from sharing physical, virtual, and software infrastructure with other clients of varying security postures, and relying on a cloud provider to implement the right security measures. Public and community clouds can be appealing targets for hackers looking to disrupt or steal information from scores of organizations with one successful strike.

  • Securing virtual machines: Considerations for the hybrid cloud

    Many people don’t realize that a majority of today’s data security solutions were designed for physical ecosystems rather than virtual environments. New technologies are needed to address concerns for hybrid cloud security, providing assurances that cloud-hosted workloads are protected from other tenants, outside threats, and cloud administrators. This article looks at several important considerations for assessing a security solution for your hybrid cloud environment.

  • Are free file storage solutions a safe bet for businesses?

    The benefits of cloud computing are becoming increasingly recognised, and with this heightened understanding comes growing numbers of UK businesses that are embracing the use of the cloud for the storage of data. As the technology continues to gather momentum on these shores, many firms and employees are likely to consider utilising popular free services such as Dropbox and Box. Such storage solutions have already been widely adopted by consumers and SMEs alike; however, these solutions are not without their risks.

  • Apple built multi-factor authenticated payment in the right order

    Apple has built a payment system by first rolling out the “second factor”—the biometric Touch ID—and then by rolling out the first factor: the payment application and API. They have spent a couple years acquainting themselves with the really hard bit: biometrics. Now they can do the easy bit: payments. Everyone else has gone about it in reverse order.

  • 5 key things to consider when developing an enterprise mobility management strategy

    Imagine this situation: Bob, the VP of Sales, loses his smartphone on the train. There are two major issues. The device is lost and sensitive company information may be exposed. Additionally, the user has to notify the IT Department to track and wipe the device. How can the exposure of sensitive company data and the negative impact on productivity be minimized?

Videos      Podcasts



Spotlight

The security threat of unsanctioned file sharing

Posted on 31 October 2014.  |  Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //