Please turn on your JavaScript for this page to function normally.
Wi-Fi
Wi-Fi risks: Delivering a secure hotspot

The fact that Wi-Fi stands for Wireless Fidelity hints at how long Wi-Fi has been around, but it was only in 1999 that the Wi-Fi Alliance formed as a trade association to hold …

Veracode
What developers and managers are saying about application security challenges

Despite showing moves toward earlier and more frequent security testing throughout the development process, there are still hurdles development and security teams must …

hourglass
More attacks, new technologies: Cybersecurity predictions for the year ahead

Every day, the cybersecurity landscape changes. Each new device connected to the network presents a new target for attackers that needs to be secured, and each new social …

cloud computing
Enhanced security facilitates your safe move to the cloud

If you haven’t moved at least some of your data to the cloud, you will. It’s inevitable at this point. Even the most highly secured organizations have some of their data on …

fish phishing
Record wave of phishing comes to an ebb in autumn 2016

The Anti-Phishing Working Group reports that the year’s record wave of phishing subsided in the autumn. According to the APWG’s new Phishing Activity Trends Report, the total …

EU flag
54% of organizations have not advanced their GDPR compliance readiness

More than half of organizations have failed to begin any work on meeting minimum General Data Protection Regulation (GDPR) compliance, according to a study conducted by Vanson …

Bitcoin
Exploring trends in automated crypto trading

Despite the risks, many traders continue to be attracted to cryptocurrency trading due to the earning potential it offers. Sasha Ivanov, CEO of Waves, explains that the crypto …

RSAC
RSA Conference 2017 debuts education program

RSA Conference announced the debut of RSAC AdvancedU – a new series of programs to educate and encourage more people to pursue a career in cybersecurity and also invigorate …

risk
Mitigating internal risk: Three steps to educate employees

IT security is usually focused on how to prevent outsiders with malicious intent from causing harm to your IT systems and data. While this is a valid concern, people within …

city
Citizens will share personal data with smart city programs by 2019

The rapid pace of technological and societal change has given government CIOs a new sense of urgency and a willingness to experiment with smart city and open data initiatives, …

earth
Playing the blame game: Breaking down cybersecurity attribution

Attributing the adversary behind a cyber attack ranks as perhaps the hardest challenge in all of cyber security, well beyond securing networks from intrusions, for the simple …

fire
Highly lucrative Ransomware as a Service attacks poised to accelerate in 2017

Ransomware can be likened to global warming. It’s been around for years, but it’s now becoming an epidemic which needs serious attention. According to a recent survey …

Don't miss

Cybersecurity news