Please turn on your JavaScript for this page to function normally.
construction
How to build a better SOC team

The security skills shortage is a very real issue. Cisco estimates that there are currently one million unfilled cyber security jobs worldwide, while a report from Frost …

signal
Wi-Fi holography: Generate a 3D image of space using stray Wi-Fi signals

Scientists at the Technical University of Munich (TUM) have developed a holographic imaging process that depicts the radiation of a Wi-Fi transmitter to generate …

money
Disconnect between investment and expected security improvements

Less than half of US firms will increase their investment in cybersecurity protection to match an expected rise in data breaches, according to a new survey conducted by Ovum. …

GDPR
When it comes to GDPR, many organizations are behind schedule for compliance

Set to go into effect on May 25, 2018, GDPR requires all organizations doing business in EU member countries to comply with new regulations governing the data privacy rights …

IoT
Despite tremendous growth, most IoT projects fail

60 percent of IoT initiatives stall at the Proof of Concept (PoC) stage and only 26 percent of companies have had an IoT initiative that they considered a complete success. …

focus
CIOs increasingly focus on innovation

Two-thirds of organizations are adapting their technology strategies in the midst of global political and economic uncertainty, with 89 percent maintaining or ramping up …

Kodi
Hackers can use subtitles to take over millions of devices running VLC, Kodi, Popcorn Time and Stremio

Check Point researchers revealed a new attack vector threatening millions of users of popular media players, including VLC, Kodi (XBMC), Popcorn Time and Stremio. By crafting …

explode
Data breach activity reaches all-time high

With over 1,200 breaches and over 3.4 billion records exposed, 2017 is already on pace to be yet another “worst year on record” for data breach activity, according to Risk …

locks
Breaking TLS: Good or bad for security?

As the use of TLS by malware and phishing increases, some security practitioners are seeking solutions to break TLS so they can monitor all traffic in and out of their …

ENISA Cyber Europe
Cybersecurity: Industry concerns and suggestions for policy makers

The EU Agency for Network and Information security – ENISA – together with industry recently reached a common position on cybersecurity, that reflects the concerns of industry …

mobile worker
Beware the coffee shop: Mobile security threats lurk around every corner

40 percent of organizations believe that C-level executives, including the CEO, are most at risk of being hacked when working outside of the office, according to a new report …

architecture
How to secure your digital transformation

Organizations are demanding and implementing new solutions that enable them to streamline operations, cultivate new business opportunities and provide better service to their …

Don't miss

Cybersecurity news