Read more about CXO
Bookmark and Share
  • A security advisor's perspective on the threat landscape

    08.04.2014

    In this interview, Sean Sullivan, the Security Advisor at F-Secure Labs, talks about threats he's seen during his career, iOS vs.

  • CISO challenges and security ROI

    07.04.2014

    Mark Brown is the Director of Information Security at EY.

  • Does IP convergence open you up to hackers?

    07.04.2014

    Recent reports indicate that unauthorized persons gained access to Target's network using credentials stolen from a company that worked on the company's refrigeration, heating, ventilation and air conditioning.

  • CIOs are moving more information into the cloud

    31.03.2014

    Despite continued concerns about security, CIOs and other senior-level IT leaders are moving an increasing percentage of their organizational information into the cloud and are making growing use of private cloud and SaaS delivery models.

  • Facebook security and privacy pitfalls

    12.03.2014

    In this interview, Andrei Serbanoiu, Online Threats Researcher at Bitdefender, discusses Facebook security and privacy pitfalls, the dangers of sharing on the social network, and offers insight for CISOs.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //