Security News

Past, present and future of threat intelligence platforms (Help Net Security)
2016-03-11 14:30

In this podcast recorded at RSA Conference 2016, John Czupak and Ryan Trost, CEO and CTO of ThreatQuotient respectively, clarify the meaning of threat intelligence and actionable intelligence....

New ways to fingerprint Tor Browser users discovered (Help Net Security)
2016-03-11 14:15

Users who want to remain anonymous online often opt for using the Tor Browser, which hides their real IP address, but there are techniques that (more or less) malicious actors can used to identify...

Corruption: The magnitude of risk (Help Net Security)
2016-03-11 14:00

40 percent of all compliance officers surveyed believe their company’s bribery and corruption risks will increase in 2016, according to a new report by Kroll and the Ethisphere Institute. One in...

Microfluidic cooling turns down the heat on high-tech equipment (Help Net Security)
2016-03-11 13:45

Thousands of electrical components make up today’s most sophisticated systems – and without innovative cooling techniques, those systems get hot. Lockheed Martin is working with the Defense...

Has your network been compromised? Use RITA to find out (Help Net Security)
2016-03-11 13:30

Have you heard about RITA? Real Intelligence Threat Analysis is a an open source tool – a framework, actually – aimed at helping organizations find malicious activity on their network. Developed...