Please turn on your JavaScript for this page to function normally.
Laptop
No more guilt about your lack of innovation in administrative IT

Helpdesks are mired in mundane tasks that are repeated every day – password resets, user account access and account creations, just to name a few. Manual tasks that really …

Enterprise multi-factor authentication market to cross $1 billion this year

Evolving cyber threats contribute to hundreds of millions of dollars in losses for businesses each year due to compromised credentials and data breaches. ABI Research …

Week in review: Security fatigue, open source jobs, and compromised online shops

Here’s an overview of some of last week’s most interesting news and articles: 100+ online shops compromised with payment data-stealing code Since March 2016 (and …

professional
Open source jobs: Insights from European professionals

The 2016 Open Source Jobs Report released earlier this year by Dice and The Linux Foundation analyzed trends for open source careers and the motivations of professionals in …

lock
Why attaching security to each piece of data is critical

Following in Edward Snowden’s footsteps, yet another NSA contractor has leaked highly classified trade secrets and government information. My question to you: Are we really …

Lock
How much is your privacy worth?

How much is your privacy worth? Take for example your bank account number, sort code, name, and address. Is it worth more than £25? Well I think that it is and as a result I …

gear
Security orchestration and automation: Closing the gap in incident response

Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …

mobile payment
Security concerns still undermining mobile payments

Concerns about fraud and theft risks are inhibiting adoption of mobile wallets, but businesses underestimate the problem. The survey found more than half of consumers believe …

talk speak speaker
Vendor Security Alliance questionnaire: Starting a security discussion with vendors

The interconnection between major organizations and their many service providers is providing a successful, and often ignored, path through which attackers are penetrating …

cloud
A closer look at data breach preparedness

While most organizations have a data breach preparedness plan in place, executives are not updating or practicing the plan regularly and lack confidence in its effectiveness, …

email
DMARC email security is now mandatory for the UK government, what can the enterprise learn?

It’s no secret by now that email has become the number one tool for cyber criminals and fraudsters. Earlier this year the FBI predicted that Business Email Compromise attacks …

fish phishing
Vast phishing campaigns boost global criminal attack footprint

The Anti-Phishing Working Group (APWG) observed a record number of phishing attacks in the second quarter of 2016. APWG observed 466,065 unique phishing websites in Q2. This …

Don't miss

Cybersecurity news