Articles
  • Point of Sale system architecture and security

    To most people, Point of Sale (POS) systems with integrated payment processing are a black box where magic happens.

    In this podcast recorded at Black Hat USA 2014, Lucas Zaichkowsky, Enterprise Defense Architect at AccessData, talks about how financial criminals breach hundreds of merchants each year, displaying a better understanding of how these systems operate than the dealer technicians that install and maintain them.

  • How important is website security?

    In this interview, Nicholas Sciberras, Product Manager at Acunetix, illustrates why website security should be a priority in any organization. He talks about the challenges involved in auditing website security, illustrates the pros and cons of using remote vs. in-house security testing, and more.

  • Why IT security is broken and how math can save it

    In this podcast recorded at Black Hat USA 2014, Stuart McClure, CEO at Cylance, talks about how the information security industry has evolved when it comes to detecting bad guys, but it's being mostly reactive and not proactive. Signature-based technologies are flawed and easily bypassed since they incorporate only a fraction of characteristics of a bad file or activity.

  • Securing the U.S. electrical grid

    The Center for the Study of the Presidency & Congress (CSPC) launched a project to bring together representatives from the Executive Branch, Congress, and the private sector to discuss how to better secure the U.S. electric grid from the threats of cyberattack, physical attack, electromagnetic pulse, and inclement weather.

    The result is the Securing the U.S. Electrical Grid report, and talking about critical security challenges we have Dan Mahaffee, the Director of Policy at CSPC.

  • Securing networks in the Internet of Things era

    The IoT will probably represent the biggest change to our relationship with the Internet since its inception. But first, we need to work out how it’s going to become reality on such a vast scale. Clearly, adding these billions of devices to networks is going to have a knock-on effect, yet there’s been relatively little commentary dedicated to the question of how the IoT is going to be delivered in practical terms. This means asking what the IoT means for networks and IT departments, and how we’re going to ensure that it’s sufficiently secure.

  • Why you’re not as secure as you think you are

    There are 2.4 billion Internet users in the world today. Many of these users, in good faith, leave their personal online security up to their service providers. Sadly, time and time again, we see these companies fail to effectively protect sensitive customer data.

  • How the role of the CSO is changing

    Since Steve Katz became the first CISO back in 1995, both business leaders and the security industry in general have been thinking and rethinking the need for such a person and the responsibilities that he or she should have.

    In this podcast recorded at Black Hat USA 2014, Rick Howard, CSO at Palo Alto Networks, talks about the role of the CSO and how it's fundamentally changing.

  • What can we learn from the top 10 biggest data breaches?

    You can’t blink these days without hearing about yet another data breach. While some may be suffering from “breach fatigue” and becoming jaded, we argue that it’s more important than ever to take cyber threats seriously.

  • Mobile device security: Tackling the risks

    Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications’ dream and a business risk nightmare.

    For those in the security industry, the focus is mainly on deploying “solutions” to provide protection. However, we are now at one of those key points of change which happen perhaps once in a generation, and that demand a new way of looking at things.

  • BGP hijacking for cryptocurrency profit

    In this podcast recorded at Black Hat USA 2014, Joe Stewart, Director of Malware Research at Dell SecureWorks, talks about his team's discovery of suspicious activity occurring on mining systems connected to the wafflepool.com mining pool.

Videos      Podcasts



Spotlight

How to talk infosec with kids

Posted on 17 September 2014.  |  It's never too early to talk infosec with kids: you simply need the right story. In fact, as cyber professionals it’s our duty to teach ALL the kids in our life about technology. If we are to make an impact, we must remember that children needed to be taught about technology on their terms.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Sep 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //