Articles
  • Why collaboration is crucial in the battle for IT security

    Guy Wertheim, the CTO at Comilion, talks about the importance of collaboration and data sharing in the battle for increased security.

  • Should a data breach be the kiss of death for the CEO?

    The fact that CEOs have tendered their resignations in the aftermath of public breaches is a clear indication that the executive level is being held more accountable for the cyber security practices of their organizations. This is a trend that will likely continue, particularly for companies like Ashely Madison whose business it is to protect their customers’ privacy.

  • How data breaches are changing information security

    In this podcast recorded at Black Hat USA 2015, Gautam Aggarwal, Chief Marketing Officer at Bay Dynamics, takes a look at the past year in the security space and the important events that have shaped the industry.

    He discusses APTs, visibility, accountability, the ramifications of high profile data breaches, as well as the way boards are getting involved in information security issues.

  • Who's afraid of shadow IT?

    One of the biggest disruptions in the IT world is the quantity and quality of SaaS tools. From email and storage, to phone systems and infrastructure, it has never been easier to use top of the range products and scale when your business does. As empowering as these tools are, there is a risk to adopting SaaS that might not be immediately apparent.

    Shadow IT is any system or service used inside of a company without explicit approval and deployed using non-IT resources. It was born out of business necessity - the need to be agile and adapt to change. The Shadow IT movement is here, and it isn’t going anywhere any time soon.

  • CPU hardware performance counters for security

    In this podcast recorded at Black Hat USA 2015, Nishad Herath, Principal Anti-Malware Technologist at Qualys, talks about CPU hardware performance counters, which allow us to do low latency performance measuring, without special runtime or compile time software instrumentation. It is said "advanced users often rely on those counters to conduct low-level performance analysis or tuning" according to Wikipedia.

  • The WhatsApp of Wall Street

    On August 21, a pump and dump penny stock scam targeting US users, and spread using WhatsApp, drove the share price of Avra Inc, a digital currency company, by 640% from its opening price of $0.17 to its peak of $1.26. What is unique about this scam is its use of WhatsApp to spread the threat, essentially using mobile applications to resurrect schemes that are dying out on email.

  • Proactive real-time security intelligence: Moving beyond conventional SIEM

    Surprisingly, discussions about security intelligence still focus primarily around conventional reactive Security Incident and Event Management systems (SIEM). However, in today’s highly active and complex landscape security professionals need to move from this reactive model to proactively using this security intelligence to protect their businesses. A proactive model which enables to predict security incidents and events besides preventing and detecting them.

  • Protect against privileged credential attacks with zero trust

    Enterprise networks – and the attacks against them – have evolved. No longer static, they are dynamic entities. And yet, IT organizations continue to use traditional security controls that aim to protect an increasingly irrelevant perimeter. It is no wonder IT organizations are failing to prevent malware infections and data loss. It won’t get any better until we take a different approach to security and adopt a new paradigm: the zero-trust model.

  • The big picture of protecting and securing Big Data

    Today almost every company is dealing with big data in one way or another – including customer data, tracking data, and behavioral marketing information – connecting every aspect of our lives. Although it can be considered trendy and useful, some of the latest “innovations” cross the line from creative to creepy. Take for example a Bluetooth-connected doll that learns how to answer the child’s questions by recording each and every movement or comment in the room. While this is a cutting edge use of technology, that kind of data monitoring can become dangerous when placed in the wrong hands.

  • Effective security starts with UX

    The two biggest contributors to security budget spend are the short-term, lower-priority challenges of internal compliance errors and accidental data leaks. That’s precisely the opposite of what it should be, and exactly why companies will spend almost $80B on security technology this year. And they won’t have much to show for their efforts.

Videos      Podcasts



Spotlight

Over 225,000 Apple accounts compromised via iOS malware

Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225,000 valid Apple accounts have been compromised.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Sep 1st
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //