Please turn on your JavaScript for this page to function normally.
Health insurance online threats revealed

Websites hosted by external providers, excessive mobile app permissions and third party code libraries represent the biggest risks to users of health insurance web and mobile …

Protecting your child’s digital identity

Each day, as infosec professionals, we dedicate ourselves to protecting our client’s most valuable assets. We spend countless hours focused on keeping data, intellectual …

Top 3 security, privacy and data protection trends for 2015

2014 was full of front page stories about data privacy, hacks, data jurisdiction and other threats that confirmed security is no longer a niche. Security is officially a …

Internet of Things predictions for 2015

IDC provides organizations with insight and perspective on long-term industry trends along with new themes that may be on the horizon. IoT and the cloud. Within the next five …

Improving your readiness for OCR audits

In the wake of healthcare data breaches, OCR audits for HIPAA compliance have become more common – and the consequences have been more highly publicized. But many …

Best practices in knowledge-based authentication

Knowledge-based authentication (KBA) is a methodology gaining increasing recognition for providing the identity proofing part of user authentication. A group of senior IT pros …

Firefox 34 comes with critical security updates

Firefox 34 includes eight security updates, three of which are Critical, three High and two moderate. MSFA-2014-91 Privileged access to security wrapped protected objects …

The 2014 Firewall Buyers Guide

NOTE: This whitepaper is no longer available, thanks for your interest. Make an informed decision on the right firewall for your business with this guide from Palo Alto …

Coordinated cyber attacks on global critical infrastructure exposed

Cylance identified coordinated attacks by hackers based in Iran on more than 50 targets in 16 countries around the globe. Victim organizations were found in a variety of …

Data loss and downtime costs enterprises $1.7 trillion

Data loss and downtime cost enterprises $1.7 trillion in the last twelve months, or the equivalent of nearly 50% of Germany’s GDP. Data loss is up by 400% since 2012 …

Cost savings drive businesses to the cloud

A survey of C-Level senior executives, developers and other industry delegates has found that 72% of respondents identified cost as the key benefit of using the cloud for the …

Training kids to become infosec superheroes

Children today embark on life in two interconnected worlds, the physical and the virtual. And just as they need to learn how to be smart and safe in the physical world, they …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools