Read more about Black Hat
Bookmark and Share
  • How the role of the CSO is changing

    21.08.2014

    Since Steve Katz became the first CISO back in 1995, both business leaders and the security industry in general have been thinking and rethinking the need for such a person and the responsibilities that he or she should have.

  • Breaking the security of physical devices

    18.08.2014

    In this podcast recorded at Black Hat USA 2014, Silvio Cesare, Director of Anti-Malware Engineering at Qualys, discusses the security measures of a number of household devices and things.

  • 86% of hackers don't worry about repercussions

    14.08.2014

    Thycotic announced the results of a survey of 127 self-identified hackers at Black Hat USA 2014.

  • Continuous monitoring for your perimeter

    14.08.2014

    Qualys Continuous Monitoring is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they turn into breaches.

  • The dangers of backdoor passwords

    12.08.2014

    In an increasingly connected world, backdoor passwords have large implications on the Internet of Things, the medical world and industrial control systems.




Spotlight

What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //