Read more about week in review
Bookmark and Share
  • Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program

    04.08.2014

    Here's an overview of some of last week's most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of changing security strategies to protect against the latest threats.

  • Week in review: Tails 0-days, iOS backdoors, and the psychology of phishing

    28.07.2014

    Here's an overview of some of last week's most interesting news, interviews and articles: EFF invites hackers to test, secure its Open Wireless Router The Electronic Frontier Foundation (EFF) has released Open Wireless Router, an experimental alpha release of wireless router software that is meant to improve some and add new capabilities to existing routers.

  • Week in review: Vulnerable web-based password managers, Mayhem malware, and Google's Project Zero

    21.07.2014

    Here's an overview of some of last week's most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman Foeckl, CEO of CoSoSys, illustrates the most prominent endpoint security myths and explains why they persist.

  • Week in review: Google catches India with fake certificates, and the risks of selling used smartphones

    14.07.2014

    Here's an overview of some of last week's most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.

  • Week in review: DDoS attacks becoming more effective, and how to build trust between business and IT

    07.07.2014

    Here's an overview of some of last week's most interesting news, articles and interviews: Gathering and using threat intelligence In this interview, Tomer Teller, Security Innovation Manager at Check Point, talks about the role of threat intelligence in the modern security architecture, discusses how it can help identify sophisticated malware attacks, and illustrates the essential building blocks of a robust threat intelligence solution.




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //