Articles
  • Why vulnerability disclosure shouldn’t be a marketing tool

    I want to talk about a vulnerability disclosure trend that I have recently noticed – a trend that I believe may ultimately cause more harm than good: security vendors using vulnerability disclosure as a marketing tool with the goal of enhancing their company’s bottom line.

  • 5 ways to stop the Internet of Things from becoming the Internet of Thieves

    The Internet of Things is here and is now on your wrist, in your pocket, in your car, and maybe even in your socks. From smart watches and self-driving cars to smart toothbrushes and digital socks that track your steps, we are living in a world where no device is an island.

  • The cloud, FedRAMP and FISMA compliance

    Many federal agencies and government contractors are migrating to cloud-based computing, a trend that will pick up speed as the cloud becomes more efficient, more affordable, and more secure. In fact, Deltek estimates the Federal Cloud market is projected to grow by $6.4B by 2019. Cloud computing offers significant economies of scale, and as such, is an attractive alternative for agencies charged with cutting costs, centralizing data processing, and reducing redundancies.

  • TLS security: What really matters and how to get there

    Deploying TLS securely is getting more complicated, rather than less. One possibility is that, with so much attention on TLS and many potential issues to consider, we're losing sight of what's really important.

    In this podcast recorded at Infosecurity Europe 2015, Ivan Ristic, Director of Engineering at Qualys and lead at SSL Labs, introduces the TLS Maturity Model - conceptual deployment model that describes a journey toward robust TLS security.

  • Connected cars: Are tomorrow's drivers at risk?

    The Internet of Things (IoT) aims to enhance the way we engage with devices around the home and we are now beginning to see the growth of this technology reach our driveways. Specifically, our automobiles. According to IHS Automotive, within five years there will be 152 million vehicles connected to the Internet via mobile apps that are now available with some car models. These apps can control your vehicle’s climate systems to providing Wi-Fi “hotspots” for mobile Internet access within the vehicle.

  • The state of cyber security in Thailand

    Thailand - the land of smiles - invited me as a panelist to the CSA ASEAN 2015 summit. Bangkok, with its fantastic street food, smiling people and general gentleness felt safe and very welcoming this June. I managed to lengthen my stay for a few extra days so that I could embrace the culture, taste the food, and meet up with the local security people.

  • How to evaluate the efficiency of a Data Loss Prevention solution

    How do you measure the Return of Investment on Data Loss Prevention (DLP) technologies? How do you know that your DLP solution is efficient?

    In this podcast recorded at Infosecurity Europe 2015, Angela Lepadatu, Marketing Coordinator at CoSoSys, gives you some ideas on how to determine if your chosen Data Loss Prevention solution is efficient.

  • U.S. Open primer: In the cloud or on the golf course, hazards can be devastating

    This week the U.S. Open heads to the Pacific Northwest for the very first time. Chambers Bay Golf Course in Washington State will play host. In the spirit of U.S. Open golf tournament and the 18 tricky holes at Chambers Bay, Perspecsys will caddy for a full round with tips and tricks to avoid the hazards – the privacy, compliance and security hazards of cloud computing – and guide you confidently through the course to realize the full benefits enterprise cloud adoption can offer.

  • Relying on your insurer for security? Think again!

    The answer for all organizations is not to “get better cyber insurance” but, instead, to focus on the right protection, detection and response capabilities. Yes, organizations need to ensure all policies are risk based, but having a good understanding of the scope required and the business as a whole to distinguish the most important assets to protect will serve organizations better. Companies should focus on ensuring their governance is sound and use a security checklist to ensure basic cyber hygiene is in place, such as patched systems, good passwords and service controls.

  • Why break in, if you can simply login?

    I was asked the other day why so many security breaches are hitting the headlines and are seemingly getting larger and more frequent. The game of cyber security has changed significantly over the years and defenders are slow to modify their playbooks and tactics. The fundamental problem is that defenders are waiting and ready for attackers to hack through the firewall but in truth the attackers are simply logging in using legitimate credentials that they attained by some other illicit method.

Videos      Podcasts



Spotlight

5 ways to stop the Internet of Things from becoming the Internet of Thieves

Attacks on the IoT can sound like the stuff of a movie thriller, but they are very real. The highly skilled and organized cybercriminals of today have the potential to tamper with a car’s firmware to kill its brakes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Jun 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //