Please turn on your JavaScript for this page to function normally.
Insider threat and privileged user abuse

Despite heightened awareness of insider threats, most organizations continue to grapple with how to mitigate risks to their networks and sensitive information. According to a …

Facebook offers free browser-based malware scanner

People share via social media more than any other channel. But with social media exploits of personal and corporate accounts frequently making headlines, it’s time for …

Legacy cybersecurity products failed to protect 97% of organizations

A new report examines attack data captured by FireEye security appliances from 1,217 organizations around the world from October 2013 to March 2014. Offering a unique glimpse …

Most compliance officers play little role in cyber security

Seventy-five percent of compliance officers are not involved in managing cyber security risk according to a report from Kroll and Compliance Week. In a survey of senior-level …

Free privacy and security scans with McAfee Mobile Security

McAfee announced the latest version of McAfee Mobile Security that now enables consumers to run free privacy and security scans. These scans allow users to identify apps that …

Fascinating MiniDuke backdoor hits again

MiniDuke – the extremely small and highly customized Asembler-based backdoor used in the past to target mostly government entities and institutions around the world …

Proofpoint acquires NetCitadel

Proofpoint has acquired NetCitadel, a pioneer in the field of automated security incident response. Under the terms of the agreement, Proofpoint paid approximately $24.0 …

Half of security pros fail to secure data

Research conducted at Infosecurity Europe 2014 has revealed that 50% of security professionals do not secure data on portable storage devices such as USBs and external hard …

Passwords remain a problem for everyone

Passwords remain a problem even for tech-conscious consumers. In an F-Secure poll, 43% of respondents report using the same password for more than one important account …

Using ITOA to secure endpoints

Businesses today invest heavily in security technology in an effort to protect the most vulnerable aspects of their IT infrastructure – the endpoints and end-user …

Risk gaps between companies and their vendors

Organizations are failing to adequately address information technology and security risks that emerge from outsourcing and partnering with third-party vendors, according to a …

Free encrypted mobile messaging app for iOS

SRD Wireless launched PQChat, a free app for iOS designed to make communications between people and businesses as safe, secure and private as possible. NTS protects data using …

Don't miss

Cybersecurity news