Please turn on your JavaScript for this page to function normally.
IBM identity
Authentication today: Moving beyond passwords

A new global study from IBM Security examining consumer perspectives around digital identity and authentication, found that people now prioritize security over convenience …

snake
How can we avoid another record year for breaches and ransomware?

More than 14.5 billion emails laced with malware were sent in 2017 according to the annual Global Security Report issued by AppRiver. The majority of cyber threats were …

PCI DSS
PCI DSS 3.2 will unveil compliance cramming culture

February 1, 2018 marks the deadline for businesses to adopt the new industry standard, PCI DSS 3.2, aimed at reducing and better responding to cyber attacks resulting in …

identity
Week in review: Intel testing new Spectre fixes, ICO protection, cybercrooks abusing travel industry

Here’s an overview of some of last week’s most interesting news, articles, and whitepapers: British teenager hacked top ranking US officials using social …

hand
Good privacy is good for business, so pay attention

Data privacy concerns are causing significant sales cycle delays for up to 65 percent of businesses worldwide, according to findings in the new Cisco 2018 Privacy Maturity …

fire
Cyber attacks surge, ransomware leading the way

The Online Trust Alliance (OTA) found that cyber incidents targeting businesses nearly doubled from 82,000 in 2016 to 159,700 in 2017. Since the majority of cyber incidents …

finance biohazard
Rise in cryptomining malware impacts organizations worldwide

Cybercriminals are increasingly turning to cryptominers to develop illegal revenue streams, while ransomware and malvertising adware continue to impact organizations …

lock
Data breaches at an all time high: How are businesses protecting themselves?

Digitally transformative technologies are shaping the way organisations do business and moving them to a data-driven world, with 94% of organisations using sensitive data in …

wallet
ICO protection: Key threats, attack tools and safeguards

Group-IB has analyzed the basic information security risks for the cryptoindustry and compiled a rating of key threats to an ICO (initial coin offering). On average, over 100 …

checklist
2018 Cybersecurity Checklist

Today’s attacks are spreading faster, evolving quicker, and evading even the most widely used security solutions. But that doesn’t mean you can’t fight back. Get practical …

Will explosive data exfiltration continue in 2018?

Last year was a banner year for cybercrime. More data was stolen in the first six months of 2017 than in the entirety of 2016. Gemalto’s Breach Level Index found that over 900 …

money
Government CIOs will increase spending on cloud, cybersecurity and analytics

Cloud solutions, cybersecurity and analytics are the top technologies targeted for new and additional spending by public sector CIOs in 2018, while data center infrastructure …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools