Read more about tips
Bookmark and Share
  • Automated threat management: No signature required

    28.07.2015

    The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals.

  • Internet of Things: Bracing for the data flood

    28.07.2015

    There’s a real opportunity now to incorporate the scaling and management (including security management) needs for the IoT in the way we plan our enterprise and consumer services.

  • Three steps to a successful cloud migration

    27.07.2015

    People are hoarders by nature. Year after year, we accumulate new things – some that we need, and some that we will never touch again after one use.

  • Why cloud business continuity is critical for your organization

    24.07.2015

    Business continuity, the ability of a company to continue or quickly restart operations following a systems outage, tends to be a topic overlooked by business leaders.

  • How experts stay safe online and what non-experts can learn from them

    23.07.2015

    Google researchers have asked 231 security experts and 294 web-users who aren’t security experts about their security best practices, and the list of top ones for each group differs considerably: "Experts recognize the benefits of updates—'Patch, patch, patch,' said one expert—while non-experts not only aren’t clear on them, but are concerned about the potential risks of software updates," Google researchers pointed out.




Spotlight

Chrome extension thwarts user profiling based on typing behavior

Infosec consultant Paul Moore came up with a working solution to thwart a type of behavioral profiling. The result is a Chrome extension called Keyboard Privacy, which prevents profiling of users by the way they type by randomizing the rate at which characters reach the DOM.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Jul 29th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //