Please turn on your JavaScript for this page to function normally.
hand
How to minimize the risk and impact of identity fraud

The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. They …

Industry
Recommendations to help the security of ICS-SCADA systems

The use of long-range communication networks, and specially the Internet, has revolutionised ICS-SCADA systems and architectures. The use of network communication in these …

building
Identity fraud hits record high

The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. …

users
AppSec teams facing resourcing issues that are making them vulnerable

A new Bugcrowd study of one hundred CISOs revealed that 94 percent are concerned about breaches in their publicly facing assets in the next 12 months, particularly within …

credit cards secure
PCI SSC publishes best practices for securing e-commerce

Exponential online sales growth paired with the EMV chip migration in the US makes e-commerce payment security for merchants more important than ever before. As EMV chip …

binary bomb
91% of phishing attacks are display name spoofs

GreatHorn analyzed more than 56 million emails from 91,500 corporate mailboxes from March to November 2016. The data found that display name spoofs are the clear phishing …

money
CSOs reveal true cost of breaches

Over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, according to the Cisco …

SSD
SSD security challenges: Which data sanitization methods are effective?

In recent years, a growing number of data breaches have resulted from the improper data removal and insecure storage of drives. Organizations face a myriad of internal and …

world biohazard
The emergence of new global cybercriminal attack patterns

The findings of a new Malwarebytes report illustrate a significant shift in cybercriminal attack and malware methodology from previous years. Ransomware, ad fraud and botnets, …

ThreatQuotient
ThreatQ 3.0: A threat intelligence platform with fine-tuned controls

ThreatQuotient announced new ThreatQ platform advancements, a robust Partner Integration Program and Professional Services offerings to answer industry demand to make threat …

Europol
Europol and GCA will fight cybercrime through the exchange of information

Europol and the Global Cyber Alliance (GCA) signed a Memorandum of Understanding (MoU) to cooperate on decreasing systemic cyber risk and improving internet security …

skull
Why companies shouldn’t feel helpless in the fight against ransomware

According to recent reports, ransomware is now a billion dollar business for cybercriminals. Attackers are honing in on the weak spots of organisations; human behaviour …

Don't miss

Cybersecurity news