Please turn on your JavaScript for this page to function normally.
alert
Six best practices for managing cyber alerts

Security professionals know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month. As the …

labyrinth
Irregular application testing: App security in healthcare

Nearly half (45%) of NHS trusts scan for application vulnerabilities just once a year, with less only 8% doing so on a daily basis, according to Veracode. This potentially …

brain
Machine learning in cybersecurity will boost big data, intelligence, and analytics spending

Cyber threats are an ever-present danger to global economies and are projected to surpass the trillion dollar mark in damages within the next year. As a result, the …

shield
Is it time to call an MSSP? Five signs that it can’t wait

Small and midsize businesses (SMBs) are fighting an uphill battle when it comes to managing their network security. According to a 2016 Ponemon study, 69 percent of SMBs don’t …

tools
Half of IT pros don’t know how to improve their security posture

Mid-market enterprises have high confidence in their cybersecurity defenses, but they struggle to defend against malicious activity that has become more sophisticated and …

money
Are businesses spending their money on the wrong IT security?

Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its 2017 Thales Data Threat Report, issued in conjunction with …

transformation
Connected homes and new hacking risks

Eight out of ten US consumers have a home data network and more than a third of them connect entertainment systems, gaming consoles and other smart devices to the Internet, …

robot
Five emerging technology trends essential to business success

People hold the power to shape and apply technology to create positive change, improve lives, and transform business and society, according to Accenture Technology Vision …

danger
Analysis of new Shamoon infections

All of the initial analysis pointed to Shamoon emerging in the Middle East. This however was not the end of the story since the campaign continues to target organizations in …

lighter
Most organizations are unaware of daily malicious activity

A new DomainTools survey of more than 550 security analysts, IT managers, and executives revealed that the majority of organizations are struggling to monitor and prevent …

Jupyter Notebook
Jupyter Notebook unwittingly opens huge server security hole

Jupyter Notebook has become a reliable tool for individuals to learn new programming languages, build proof-of-concept tools and analyze data. However, there are severe …

USA flag
Top 10 most malware-infected US cities

Webroot revealed the top 10 most malware-infected US cities. According to Webroot’s data, Houston is the most infected US city with 60,801 infected devices. The research …

Don't miss

Cybersecurity news