Read more about insider threat
Bookmark and Share
  • Identify unknown internal email-enabled systems

    15.08.2013

    Sendmail today introduced Sentrion Rogue Email Application Control (REAC) 2.0, the first inside-threat protection application with new Big Data search capabilities to further protect organizations against the growing internal threats posed by machine-generated email, which accounts for more than 50% of all corporate email traffic.

  • Exploring critical infrastructure security and government cyber security

    13.08.2013

    Chris Folk is the Director of National Protection Portfolio, The MITRE Corporation.

  • What are users doing after log-in?

    07.06.2013

    Businesses today use up to 50 on-premises applications and 25 cloud-based applications on average, so identity and access management (IAM) technologies to secure data and deliver user convenience can be critical.

  • The enterprise security time bomb

    04.06.2013

    Companies are at serious risk of data security breaches as 38 percent of U.S.

  • Ex employee hacked into high-voltage power manufacturer's network

    03.05.2013

    A criminal complaint was unsealed on Thursday in federal court in the Eastern District of New York charging Michael Meneses - who was arrested earlier that day in Smithtown, Long Island - with hacking into the computer network of a company that manufactures high-voltage power supplies, causing the company over $90,000 in damage.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //