Articles
  • 10 practical security tips for DevOps

    More organizations are embracing DevOps and automation to realize compelling business benefits, such as more frequent feature releases, increased application stability, and more productive resource utilization. However, many security and compliance monitoring tools have not kept up. In fact, they often represent the largest single remaining barrier to continuous delivery.

  • Crowdsourcing your bug bounty program


    In this interview, David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way.

  • The multiple benefits of IT auditing

    Regulatory compliance requirements provide instructions for organizations on how to protect the data of their employees, business operations, and customers that are stored on their servers. The process of satisfying compliance requirements starts with IT auditing, performed either by an internal or external professional auditor using specialized software.

  • Behavioral biometrics: The password you can’t forget

    The boundaries of what defines a bank or payment provider are blurring, with innovators such as Apple and PayPal now competing in this space. These companies, which excel in customer service, are forcing the banks to consider how they can deliver the frictionless user experience that consumers now demand. That is, how they can balance the all-important triangle of privacy, convenience, and security.

  • Banks and IT security: The elements of success

    In this interview, Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank, discusses how data breaches re-shaped their data protection strategies, and more.

  • Data lurking: How to protect your company against overlooked insider threats

    Enterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come from employees or system errors, not outsiders.

    According to Ponemon’s 2013 Data Breach Report, human or system error is still the cause of 64 percent of data breaches. So the question remains – how can a company protect itself from an insider threat? Here are the worst internal offenders and solutions to make sure an employee doesn’t become an enemy.

  • Implementing an effective risk management framework

    In today’s marketplace, almost every employee is now a content contributor. Although beneficial to the collective of information available, this influx brings about new risk. Legal systems worldwide are clamping down and demanding greater compliance – particularly on IT systems – making it essential for organizations to implement compliance and risk management protocols. So how do we balance the benefit of the free flow of information with the risk of inappropriate access and/or disclosure? What are the consequences of not doing so?

  • Four advantages of an identity behavior-based approach to cybersecurity

    More and more companies are falling into the trap of buying a next-gen security system that still relies on today’s ineffective firewall, IPS, malware sandboxing system and security information and event management (SIEM) processes and technologies. Many believe that these next-gen tools will stop data breaches better than their predecessors, yet, year-over-year, we see an increase in the number of data breaches.

  • Protecting the critical infrastructure: Strategies, challenges and regulation

    In this interview, Raj Samani, VP and CTO EMEA at Intel Security, talks about successful information security strategies aimed at the critical infrastructure, government challenges, the role of regulation, and more.

  • Trumping cybercriminals during tax season: Tips on how to stay safe

    Tax season is stressful for many reasons and April 15 equals a headache for many Americans. In addition to wading through taxes, tax season also opens up a new vector in which cybercriminals can attack. With consumers sending and receiving very personal information over email – one of the weakest links in the cyber security fence – cybercriminals are on high alert, looking for the most opportune moment to strike.

Videos      Podcasts



Spotlight

Crowdsourcing your bug bounty program

David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Mar 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //