Articles
  • How to eliminate encryption silos

    Working in the encryption business, you’ll quickly learn that there are a number of problems that organizations can run into while deploying the technology. The often-fragmented nature of IT across an entire enterprise can make encryption immensely complicated to deploy and even end up causing headaches rather than curing them. So when we encounter a trend that offers a chance to overcome some of those complexities, it’s worth taking notice. Just such a trend has been emerging lately among some of the larger, security-minded enterprises, and it involves the IT departments looking to act as encryption service providers within their own companies.

  • Is Hadoop secure enough for the enterprise?

    An ever-increasing number of organisations are turning to big data to gain valuable insight that can be immediately acted on to increase revenue, lower operating costs, or mitigate risk. For many companies, big data creates new, innovative opportunities and also provides a competitive advantage. In fact 70% of IT decision-makers believe an organisation’s ability to garner value from big data is critical to its future success.

  • Inside job: 6 ways employees pose an insider threat

    CISOs and CIOs have seen the prospects of losing control over data and the accompanying data privacy and security concerns as the biggest hurdle to cloud adoption. According to the Cloud Security Alliance's Cloud Adoption, Practices and Priorities Survey Report 73% of respondents cited data security as the top challenge holding back cloud adoption.

  • Six trends that will further the development of the Internet of Things

    Lasse Andresen, CTO at ForgeRock, illustrates the trends that will further the development of the Internet of Things.

  • Turn the Cyber Kill Chain against your attacker

    As businesses move to the cloud, the rapid adoption of Infrastructure as a Service (IaaS) is no surprise. Unfortunately, securing the cloud and the data within it is no easy task. The speed and complexity of cloud computing requires a new, software-defined approach that differs from the strategies employed in a traditional, on-premise data center, leaving many wondering where to start.

  • How will billions of devices impact the Privacy of Things?

    The Internet of Things (IoT) will create the single largest, most chaotic conversation in the history of language. Imagine every human being on the planet stepping outside and yelling at the top of their lungs everything that comes into their heads, and you still wouldn’t be close to the scale of communications that are going to occur when all those IoT devices really get chattering.

  • Keeping your business secure this holiday season

    2015 is coming to a close, but as employees prepare for the holiday season and the new year, cyber criminals aren’t taking a break and are looking for opportunities to take advantage of opportunistic security gaps.

  • Cybercriminals will remain victorious in 2016, relief expected in 2018

    From Ashley Madison to the United States Office of Personnel Management – and many, many others in between – what we now know is targets for cyber criminals and nation-state hacktivists have only broadened in 2015. But, in 2016, will the good guys make any progress toward stopping the bad? Or, can we expect another year of more inventive and damaging attacks?

  • Why we need digital security forensic analysis

    Basic common sense tells us you can’t fix what you don’t know is broken. Knowing the “who”, “what”, “why”, “when” and “where” is paramount, when you think about processes that are capable to generate information and, more importantly, are able to learn and act upon the accumulated knowledge.

  • Human element of security to the fore at IRISSCON 2015

    The most neglected part of security is the human factor – and yet it’s also the most vulnerable. Several of the speakers at the recently held IRISSCON cyber crime conference riffed on this recurring theme throughout the day–long event. “Social engineering a human is more effective than getting malware onto a computer,” said Bob McArdle, manager of Trend Micro’s forward looking threat team.

Videos      Podcasts



Spotlight

Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Feb 4th
    COPYRIGHT 1998-2016 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //