Please turn on your JavaScript for this page to function normally.
Top tips to protect systems against insider misuse

The 2014 Verizon Data Breach Investigations Report revealed a disturbing trend, which is the fact that users’ access rights have become a weak point in the security …

High-volume DDoS attacks on the rise

A continuing trend of DDoS attacks are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of …

Blackphone and Silent Circle announce bug bounty program

Blackphone and Silent Circle today announced the launch of their bug bounty program. Both companies’ mission is to enable secure and private communications for …

Mobile device security is sacrificed for workforce efficiency

While mobile devices are an integral part of the workplace, the cyber security practices and budgets in most organizations are not keeping pace with the growing number of …

European banks and Europol join forces to fight cybercrime

The European Banking Federation (EBF) and Europol’s European Cybercrime Centre (EC3) signed a Memorandum of Understanding (MoU) which paves the way for intensifying …

McAfee delivers new security suites

McAfee released McAfee AntiVirus Plus 2015, McAfee Internet Security 2015, McAfee Total Protection 2015, and the McAfee LiveSafe 2015 service that protects a customer’s …

Federal regulations on cyber security lead to revenue loss

Even though 87 percent those surveyed in the financial service industry agree that current regulatory changes are very important or critical to keeping their companies and …

Every budget is now an IT budget

IT is more and more a key component of all business initiatives and is becoming an important part of those budgets, according to Gartner, Inc. CIOs must work with business …

Users trust mobile service providers more than employers

Privacy from employers is the top concern for employees being asked to use their own devices for work purposes, according to AdaptiveMobile. The research found that while over …

Week in review: Microsoft axes Trustworthy Computing Group, Apple’s new privacy policy, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: (IN)SECURE Magazine issue 43 released (IN)SECURE Magazine is a …

Security pros don’t know the number of cloud apps in their networks

In what could be called a tale of perception versus reality, the Cloud Security Alliance (CSA) released the results of a new survey that found a significant difference between …

How to keep your contactless payments secure

Contactless transactions – ranging from access control and ticketing to financial payments – emerged almost two decades ago and, since then, have become widely …

Don't miss

Cybersecurity news